Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/rdoc@3.3
purl pkg:gem/rdoc@3.3
Next non-vulnerable version 6.1.2.1
Latest non-vulnerable version 6.6.3.1
Risk 10.0
Vulnerabilities affecting this package (6)
Vulnerability Summary Fixed by
VCID-3s9f-prpy-hbcx
Aliases:
CVE-2019-11358
GHSA-6c3j-c64m-qhgq
Cross-site Scripting The jQuery library, which is included in rdoc, mishandles `jQuery.extend(true, {}, ...)` because of Object.prototype pollution. If an unsanitized source object contained an enumerable `__proto__` property, it could extend the native `Object.prototype.`
6.1.2
Affected by 1 other vulnerability.
VCID-5618-53yg-8qh4
Aliases:
CVE-2020-11022
GHSA-gxr4-xjj5-5px2
Potential XSS vulnerability in jQuery ### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround the issue without upgrading, adding the following to your code: ```js jQuery.htmlPrefilter = function( html ) { return html; }; ``` You need to use at least jQuery 1.12/2.2 or newer to be able to apply this workaround. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://jquery.com/upgrade-guide/3.5/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
3.5
Affected by 4 other vulnerabilities.
VCID-cvxp-ctj9-guej
Aliases:
CVE-2020-11023
GHSA-jpcq-cgw6-v4j6
Potential XSS vulnerability in jQuery ### Impact Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
3.5
Affected by 4 other vulnerabilities.
VCID-pb4n-q6u8-syds
Aliases:
CVE-2013-0256
GHSA-v2r9-c84j-v7xm
OSV-90004
XSS exploit of RDoc documentation generated by rdoc This exploit may lead to cookie disclosure to third parties. The exploit exists in darkfish.js which is copied from the RDoc install location to the generated documentation. RDoc is a static documentation generation tool. Patching the library itself is insufficient to correct this exploit.
3.9.5
Affected by 4 other vulnerabilities.
3.10.pre.1
Affected by 4 other vulnerabilities.
3.12
Affected by 5 other vulnerabilities.
3.12.1
Affected by 4 other vulnerabilities.
4.0.0.rc.2
Affected by 4 other vulnerabilities.
VCID-tmjp-8edk-nyh3
Aliases:
CVE-2015-9251
GHSA-rmxg-73gg-4p98
The jQuery library, which is included in rdoc, is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing `text/javascript` responses to be executed.
6.1.2
Affected by 1 other vulnerability.
VCID-xdph-4cg9-6qah
Aliases:
CVE-2012-6708
GHSA-2pqj-h3vj-pqgw
The jQuery library, which is included in rdoc, is vulnerable to Cross-site Scripting (XSS) attacks. jQuery only deems the input to be HTML if it explicitly starts with the `<` character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
6.1.2
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T21:03:04.673616+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11022.yml 38.4.0
2026-04-16T21:03:02.290875+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11023.yml 38.4.0
2026-04-16T20:53:50.834229+00:00 GitLab Importer Affected by VCID-3s9f-prpy-hbcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2019-11358.yml 38.4.0
2026-04-16T20:41:11.387286+00:00 GitLab Importer Affected by VCID-tmjp-8edk-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2015-9251.yml 38.4.0
2026-04-16T20:41:11.011386+00:00 GitLab Importer Affected by VCID-xdph-4cg9-6qah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2012-6708.yml 38.4.0
2026-04-16T20:30:24.253553+00:00 GitLab Importer Affected by VCID-pb4n-q6u8-syds https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2013-0256.yml 38.4.0
2026-04-16T17:34:56.002168+00:00 Ruby Importer Affected by VCID-pb4n-q6u8-syds https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml 38.4.0
2026-04-16T01:19:55.046988+00:00 GHSA Importer Affected by VCID-pb4n-q6u8-syds https://github.com/advisories/GHSA-v2r9-c84j-v7xm 38.4.0
2026-04-11T22:14:26.450720+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11022.yml 38.3.0
2026-04-11T22:14:24.574756+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11023.yml 38.3.0
2026-04-11T22:04:44.163813+00:00 GitLab Importer Affected by VCID-3s9f-prpy-hbcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2019-11358.yml 38.3.0
2026-04-11T21:51:46.032522+00:00 GitLab Importer Affected by VCID-tmjp-8edk-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2015-9251.yml 38.3.0
2026-04-11T21:51:45.369775+00:00 GitLab Importer Affected by VCID-xdph-4cg9-6qah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2012-6708.yml 38.3.0
2026-04-11T21:40:50.346590+00:00 GitLab Importer Affected by VCID-pb4n-q6u8-syds https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2013-0256.yml 38.3.0
2026-04-11T21:31:37.116397+00:00 Ruby Importer Affected by VCID-pb4n-q6u8-syds https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml 38.3.0
2026-04-11T12:48:00.866214+00:00 GHSA Importer Affected by VCID-pb4n-q6u8-syds https://github.com/advisories/GHSA-v2r9-c84j-v7xm 38.3.0
2026-04-02T22:26:46.399168+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11022.yml 38.1.0
2026-04-02T22:26:44.680655+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11023.yml 38.1.0
2026-04-02T22:17:40.273876+00:00 GitLab Importer Affected by VCID-3s9f-prpy-hbcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2019-11358.yml 38.1.0
2026-04-02T22:05:33.946525+00:00 GitLab Importer Affected by VCID-tmjp-8edk-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2015-9251.yml 38.1.0
2026-04-02T22:05:33.319651+00:00 GitLab Importer Affected by VCID-xdph-4cg9-6qah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2012-6708.yml 38.1.0
2026-04-02T21:54:59.266147+00:00 GitLab Importer Affected by VCID-pb4n-q6u8-syds https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2013-0256.yml 38.1.0
2026-04-02T19:30:17.408026+00:00 Ruby Importer Affected by VCID-pb4n-q6u8-syds https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml 38.1.0
2026-04-02T13:43:02.185918+00:00 GHSA Importer Affected by VCID-pb4n-q6u8-syds https://github.com/advisories/GHSA-v2r9-c84j-v7xm 38.1.0
2026-04-01T16:44:43.013359+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11022.yml 38.0.0
2026-04-01T16:44:41.078279+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11023.yml 38.0.0
2026-04-01T16:35:18.424034+00:00 GitLab Importer Affected by VCID-3s9f-prpy-hbcx https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2019-11358.yml 38.0.0
2026-04-01T16:22:31.270024+00:00 GitLab Importer Affected by VCID-tmjp-8edk-nyh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2015-9251.yml 38.0.0
2026-04-01T16:22:30.765233+00:00 GitLab Importer Affected by VCID-xdph-4cg9-6qah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2012-6708.yml 38.0.0
2026-04-01T16:12:15.761809+00:00 GitLab Importer Affected by VCID-pb4n-q6u8-syds https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2013-0256.yml 38.0.0
2026-04-01T15:47:01.094720+00:00 Ruby Importer Affected by VCID-pb4n-q6u8-syds https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml 38.0.0