Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Yard
(Yardoc)Repositories | https://github.com/lsegal/yard |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-02-28 | CVE-2024-27285 | YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36. | Debian_linux, Fedora, Yard | 6.1 | ||
2019-07-29 | CVE-2019-1020001 | yard before 0.9.20 allows path traversal. | Yard | 7.5 | ||
2017-11-28 | CVE-2017-17042 | lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files. | Yard | 7.5 |