Логотип exploitDog
bind:"CVE-2025-24294" OR bind:"CVE-2025-58767" OR bind:"CVE-2025-61594"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-24294" OR bind:"CVE-2025-58767" OR bind:"CVE-2025-61594"

Количество 19

Количество 19

oracle-oval логотип

ELSA-2025-23141

17 дней назад

ELSA-2025-23141: ruby security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-23063

17 дней назад

ELSA-2025-23063: ruby:3.3 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-23062

17 дней назад

ELSA-2025-23062: ruby:3.3 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-24294

6 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-24294

6 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-24294

6 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-24294

6 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerab ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3776-1

2 месяца назад

Security update for ruby2.5

EPSS: Низкий
github логотип

GHSA-xh69-987w-hrp8

6 месяцев назад

resolv vulnerable to DoS via insufficient DNS domain name length validation

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2025-15238

6 месяцев назад

Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20250908-11

4 месяца назад

Уязвимость ruby

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-58767

3 месяца назад

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2025-58767

3 месяца назад

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2025-58767

3 месяца назад

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2025-58767

3 месяца назад

REXML has a DoS condition when parsing malformed XML file

EPSS: Низкий
debian логотип

CVE-2025-58767

3 месяца назад

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 h ...

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20251111-05

около 2 месяцев назад

Уязвимость rubygem-rexml

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-c2f4-jgmc-q2r5

3 месяца назад

REXML has DoS condition when parsing malformed XML file

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4264-1

около 1 месяца назад

Security update for ruby2.5

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2025-23141

ELSA-2025-23141: ruby security update (MODERATE)

17 дней назад
oracle-oval логотип
ELSA-2025-23063

ELSA-2025-23063: ruby:3.3 security update (MODERATE)

17 дней назад
oracle-oval логотип
ELSA-2025-23062

ELSA-2025-23062: ruby:3.3 security update (MODERATE)

17 дней назад
ubuntu логотип
CVE-2025-24294

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-24294

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 5.3
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-24294

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-24294

The attack vector is a potential Denial of Service (DoS). The vulnerab ...

CVSS3: 7.5
0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:3776-1

Security update for ruby2.5

0%
Низкий
2 месяца назад
github логотип
GHSA-xh69-987w-hrp8

resolv vulnerable to DoS via insufficient DNS domain name length validation

CVSS3: 5.3
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-15238

Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
6 месяцев назад
redos логотип
ROS-20250908-11

Уязвимость ruby

CVSS3: 7.5
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-58767

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 5.3
0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-58767

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 2.9
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-58767

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 5.3
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-58767

REXML has a DoS condition when parsing malformed XML file

0%
Низкий
3 месяца назад
debian логотип
CVE-2025-58767

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 h ...

CVSS3: 5.3
0%
Низкий
3 месяца назад
redos логотип
ROS-20251111-05

Уязвимость rubygem-rexml

CVSS3: 5.3
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-c2f4-jgmc-q2r5

REXML has DoS condition when parsing malformed XML file

0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4264-1

Security update for ruby2.5

около 1 месяца назад

Уязвимостей на страницу