Логотип exploitDog
bind:"CVE-2025-24294" OR bind:"CVE-2025-58767" OR bind:"CVE-2025-61594"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-24294" OR bind:"CVE-2025-58767" OR bind:"CVE-2025-61594"

Количество 27

Количество 27

rocky логотип

RLSA-2025:23141

около 1 месяца назад

Moderate: ruby security update

EPSS: Низкий
rocky логотип

RLSA-2025:23063

около 1 месяца назад

Moderate: ruby:3.3 security update

EPSS: Низкий
rocky логотип

RLSA-2025:23062

около 1 месяца назад

Moderate: ruby:3.3 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-23141

2 месяца назад

ELSA-2025-23141: ruby security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-23063

2 месяца назад

ELSA-2025-23063: ruby:3.3 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-23062

2 месяца назад

ELSA-2025-23062: ruby:3.3 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-24294

7 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-24294

7 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-24294

7 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-24294

7 месяцев назад

The attack vector is a potential Denial of Service (DoS). The vulnerab ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3776-1

4 месяца назад

Security update for ruby2.5

EPSS: Низкий
github логотип

GHSA-xh69-987w-hrp8

7 месяцев назад

resolv vulnerable to DoS via insufficient DNS domain name length validation

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2025-15238

7 месяцев назад

Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20250908-11

5 месяцев назад

Уязвимость ruby

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-61594

около 1 месяца назад

URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.

EPSS: Низкий
nvd логотип

CVE-2025-61594

около 1 месяца назад

URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.

EPSS: Низкий
msrc логотип

CVE-2025-61594

около 1 месяца назад

URI Credential Leakage Bypass over CVE-2025-27221

EPSS: Низкий
debian логотип

CVE-2025-61594

около 1 месяца назад

URI is a module providing classes to handle Uniform Resource Identifie ...

EPSS: Низкий
ubuntu логотип

CVE-2025-58767

5 месяцев назад

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2025-58767

5 месяцев назад

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 2.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:23141

Moderate: ruby security update

около 1 месяца назад
rocky логотип
RLSA-2025:23063

Moderate: ruby:3.3 security update

около 1 месяца назад
rocky логотип
RLSA-2025:23062

Moderate: ruby:3.3 security update

около 1 месяца назад
oracle-oval логотип
ELSA-2025-23141

ELSA-2025-23141: ruby security update (MODERATE)

2 месяца назад
oracle-oval логотип
ELSA-2025-23063

ELSA-2025-23063: ruby:3.3 security update (MODERATE)

2 месяца назад
oracle-oval логотип
ELSA-2025-23062

ELSA-2025-23062: ruby:3.3 security update (MODERATE)

2 месяца назад
ubuntu логотип
CVE-2025-24294

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-24294

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 5.3
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-24294

The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.

CVSS3: 7.5
0%
Низкий
7 месяцев назад
debian логотип
CVE-2025-24294

The attack vector is a potential Denial of Service (DoS). The vulnerab ...

CVSS3: 7.5
0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:3776-1

Security update for ruby2.5

0%
Низкий
4 месяца назад
github логотип
GHSA-xh69-987w-hrp8

resolv vulnerable to DoS via insufficient DNS domain name length validation

CVSS3: 5.3
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-15238

Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
7 месяцев назад
redos логотип
ROS-20250908-11

Уязвимость ruby

CVSS3: 7.5
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-61594

URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.

0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-61594

URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.

0%
Низкий
около 1 месяца назад
msrc логотип
CVE-2025-61594

URI Credential Leakage Bypass over CVE-2025-27221

0%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-61594

URI is a module providing classes to handle Uniform Resource Identifie ...

0%
Низкий
около 1 месяца назад
ubuntu логотип
CVE-2025-58767

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 5.3
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-58767

REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.

CVSS3: 2.9
0%
Низкий
5 месяцев назад

Уязвимостей на страницу