After reading this question users warned that this method of encoding html is unsafe
    return $('<div/>').html(encodedText).text();
"don't use jQuery.html().text() to decode html entities as it's unsafe because user input should never have access to the DOM "
"I suggest using a safer, more optimized function"
The purpose of this method is to take encoded input i.e Fish & chips and produce unencoded output i.e Fish & Chips
So as I understand it, they claim that for some value of encodedText, that javascript can be executed. I tried to reproduce this setting encodedText to <script>alert(1)</script> and a few other simple attacks and was unable to find any signs of XSS vulnerability.
My question is: is there any demonstrable xss vulnerability in any browser when using $('<div/>').html(encodedText).text()
 
     
    