VYPR
Moderate severityNVD Advisory· Published Mar 1, 2013· Updated Apr 29, 2026

CVE-2013-0256

CVE-2013-0256

Description

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
rdocRubyGems
>= 2.3.0, < 3.12.13.12.1

Affected products

17
  • Ruby Lang/Rdoc2 versions
    cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*+ 1 more
    • cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*
    • cpe:2.3:a:ruby-lang:rdoc:*:*:*:*:*:ruby:*:*range: >=2.3.0,<3.12
  • Ruby Lang/Ruby13 versions
    cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*+ 12 more
    • cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*+ 1 more
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*

Patches

1

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

17

News mentions

0

No linked articles in our index yet.