Total vulnerabilities in the database
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
Software | From | Fixed in |
---|---|---|
ruby-lang / ruby | 2.0.0 | 2.0.0.x |
ruby-lang / ruby | 1.9.3-p286 | 1.9.3-p286.x |
ruby-lang / ruby | 1.9.3-p383 | 1.9.3-p383.x |
ruby-lang / ruby | 2.0 | 2.0.x |
ruby-lang / ruby | 1.9.2 | 1.9.2.x |
ruby-lang / ruby | 1.9.1 | 1.9.1.x |
ruby-lang / ruby | 1.9.3-p125 | 1.9.3-p125.x |
ruby-lang / ruby | 2.0.0-rc1 | 2.0.0-rc1.x |
ruby-lang / ruby | 1.9.3-p194 | 1.9.3-p194.x |
ruby-lang / ruby | 1.9.3 | 1.9.3.x |
ruby-lang / ruby | 1.9 | 1.9.x |
ruby-lang / ruby | 2.0.0-rc2 | 2.0.0-rc2.x |
ruby-lang / ruby | 1.9.3-p0 | 1.9.3-p0.x |
ruby-lang / rdoc | 2.3.0 | 3.12 |
ruby-lang / rdoc | 4.0.0-preview2 | 4.0.0-preview2.x |
canonical / ubuntu_linux | 12.10 | 12.10.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
![]() |
2.3.0 | 3.12.1 |