4.3

CVE-2013-0256

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

Data is provided by the National Vulnerability Database (NVD)
Ruby-langRdoc SwPlatformruby Version >= 2.3.0 < 3.12
Ruby-langRdoc Version4.0.0 Updatepreview2 SwPlatformruby
Ruby-langRuby Version1.9
Ruby-langRuby Version1.9.1
Ruby-langRuby Version1.9.2
Ruby-langRuby Version1.9.3
Ruby-langRuby Version1.9.3 Updatep0
Ruby-langRuby Version1.9.3 Updatep125
Ruby-langRuby Version1.9.3 Updatep194
Ruby-langRuby Version1.9.3 Updatep286
Ruby-langRuby Version1.9.3 Updatep383
Ruby-langRuby Version2.0
Ruby-langRuby Version2.0.0
Ruby-langRuby Version2.0.0 Updaterc1
Ruby-langRuby Version2.0.0 Updaterc2
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version12.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.58% 0.873
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.