Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3753-1 | yard security update |
Debian DSA |
DSA-5635-1 | yard security update |
EUVD |
EUVD-2024-0579 | YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36. |
Github GHSA |
GHSA-8mq4-9jjh-9xrc | YARD's default template vulnerable to Cross-site Scripting in generated frames.html |
Ubuntu USN |
USN-6731-1 | YARD vulnerabilities |
Fri, 14 Feb 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux Fedoraproject Fedoraproject fedora |
|
| CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux Fedoraproject Fedoraproject fedora |
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yardoc
Yardoc yard |
|
| CPEs | cpe:2.3:a:yardoc:yard:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yardoc
Yardoc yard |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:46:21.796Z
Reserved: 2024-02-22T18:08:38.872Z
Link: CVE-2024-27285
Updated: 2024-08-02T00:28:00.247Z
Status : Analyzed
Published: 2024-02-28T20:15:41.940
Modified: 2025-02-14T15:31:24.213
Link: CVE-2024-27285
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN