rubygem-rdoc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rubygem-rdoc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
HTTP Request Smuggling

<0:4.0.0-36.amzn2.0.13
  • M
Out-of-bounds Read

<0:4.0.0-36.amzn2.0.12
  • M
Arbitrary Code Injection

<0:4.0.0-36.amzn2.0.11
  • M
XML External Entity (XXE) Injection

<0:4.0.0-36.amzn2.0.12
  • M
Cleartext Transmission of Sensitive Information

<0:4.0.0-36.amzn2.0.10
  • M
Information Exposure

<0:4.0.0-36.amzn2.0.9
  • H
HTTP Response Splitting

<0:4.0.0-36.amzn2.0.8
  • H
Resource Exhaustion

<0:4.0.0-36.amzn2.0.7
  • H
HTTP Response Splitting

<0:4.0.0-36.amzn2.0.7
  • H
Reliance on Cookies without Validation and Integrity Checking

<0:4.0.0-36.amzn2.0.7
  • H
Arbitrary Code Injection

<0:4.0.0-36.amzn2.0.7
  • H
Null Byte Interaction Error (Poison Null Byte)

<0:4.0.0-36.amzn2.0.7
  • M
Resource Exhaustion

<0:4.0.0-36.amzn2.0.6
  • M
Out-of-bounds Read

<0:4.0.0-36.amzn2.0.5
  • M
Improper Input Validation

<0:4.0.0-36.amzn2.0.4
  • M
Arbitrary Command Injection

<0:4.0.0-36.amzn2.0.2
  • M
Out-of-bounds Read

<0:4.0.0-36.amzn2.0.3
  • M
HTTP Request Smuggling

<0:4.0.0-36.amzn2.0.2
  • M
Improper Input Validation

<0:4.0.0-36.amzn2.0.2
  • M
Improper Input Validation

<0:4.0.0-36.amzn2.0.1
  • M
Directory Traversal

<0:4.0.0-36.amzn2.0.1
  • M
Use of Externally-Controlled Format String

<0:4.0.0-36.amzn2.0.1
  • M
Resource Exhaustion

<0:4.0.0-36.amzn2.0.1
  • M
Directory Traversal

<0:4.0.0-36.amzn2.0.1
  • M
Directory Traversal

<0:4.0.0-36.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:4.0.0-36.amzn2.0.1
  • M
CVE-2018-16396

<0:4.0.0-36.amzn2.0.1
  • M
Improper Input Validation

<0:4.0.0-36.amzn2.0.1
  • M
Deserialization of Untrusted Data

<0:4.0.0-36.amzn2.0.1
  • M
Link Following

<0:4.0.0-36.amzn2.0.1
  • M
Improper Verification of Cryptographic Signature

<0:4.0.0-36.amzn2.0.1
  • M
HTTP Response Splitting

<0:4.0.0-36.amzn2.0.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.0.0-36.amzn2.0.1
  • H
Arbitrary Code Injection

<0:4.0.0-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:4.0.0-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:4.0.0-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:4.0.0-35.amzn2.0.1
  • H
CVE-2018-16395

<0:4.0.0-34.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:4.0.0-33.amzn2.0.1
  • M
Directory Traversal

<0:4.0.0-33.amzn2.0.1
  • M
Improper Input Validation

<0:4.0.0-33.amzn2.0.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.0.0-33.amzn2.0.1
  • M
Deserialization of Untrusted Data

<0:4.0.0-33.amzn2.0.1
  • M
Improper Verification of Cryptographic Signature

<0:4.0.0-33.amzn2.0.1
  • M
Link Following

<0:4.0.0-33.amzn2.0.1
  • M
Arbitrary Code Injection

<0:4.0.0-33.amzn2.0.1