Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0256

Опубликовано: 01 мар. 2013
Источник: debian
EPSS Низкий

Описание

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby1.9.1fixed1.9.3.194-6package
ruby1.8not-affectedpackage

Примечания

  • http://marc.info/?l=oss-security&m=136021623726440&w=2

  • https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60

EPSS

Процентиль: 87%
0.03584
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

redhat
около 13 лет назад

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

nvd
почти 13 лет назад

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

github
больше 8 лет назад

RDoc contains XSS vulnerability

EPSS

Процентиль: 87%
0.03584
Низкий