Количество 29
Количество 29
RLSA-2025:23141
Moderate: ruby security update
RLSA-2025:23063
Moderate: ruby:3.3 security update
RLSA-2025:23062
Moderate: ruby:3.3 security update
ELSA-2025-23141
ELSA-2025-23141: ruby security update (MODERATE)
ELSA-2025-23063
ELSA-2025-23063: ruby:3.3 security update (MODERATE)
ELSA-2025-23062
ELSA-2025-23062: ruby:3.3 security update (MODERATE)
CVE-2025-24294
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
CVE-2025-24294
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
CVE-2025-24294
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
CVE-2025-24294
CVE-2025-24294
The attack vector is a potential Denial of Service (DoS). The vulnerab ...
SUSE-SU-2025:3776-1
Security update for ruby2.5
GHSA-xh69-987w-hrp8
resolv vulnerable to DoS via insufficient DNS domain name length validation
BDU:2025-15238
Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20250908-11
Уязвимость ruby
CVE-2025-61594
URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.
CVE-2025-61594
URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.
CVE-2025-61594
URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.
CVE-2025-61594
URI Credential Leakage Bypass over CVE-2025-27221
CVE-2025-61594
URI is a module providing classes to handle Uniform Resource Identifie ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2025:23141 Moderate: ruby security update | 3 месяца назад | |||
RLSA-2025:23063 Moderate: ruby:3.3 security update | 3 месяца назад | |||
RLSA-2025:23062 Moderate: ruby:3.3 security update | 3 месяца назад | |||
ELSA-2025-23141 ELSA-2025-23141: ruby security update (MODERATE) | 4 месяца назад | |||
ELSA-2025-23063 ELSA-2025-23063: ruby:3.3 security update (MODERATE) | 4 месяца назад | |||
ELSA-2025-23062 ELSA-2025-23062: ruby:3.3 security update (MODERATE) | 4 месяца назад | |||
CVE-2025-24294 The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition. | CVSS3: 7.5 | 0% Низкий | 9 месяцев назад | |
CVE-2025-24294 The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition. | CVSS3: 5.3 | 0% Низкий | 9 месяцев назад | |
CVE-2025-24294 The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition. | CVSS3: 7.5 | 0% Низкий | 9 месяцев назад | |
CVSS3: 7.5 | 0% Низкий | около 1 месяца назад | ||
CVE-2025-24294 The attack vector is a potential Denial of Service (DoS). The vulnerab ... | CVSS3: 7.5 | 0% Низкий | 9 месяцев назад | |
SUSE-SU-2025:3776-1 Security update for ruby2.5 | 0% Низкий | 5 месяцев назад | ||
GHSA-xh69-987w-hrp8 resolv vulnerable to DoS via insufficient DNS domain name length validation | CVSS3: 5.3 | 0% Низкий | 9 месяцев назад | |
BDU:2025-15238 Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | 9 месяцев назад | |
ROS-20250908-11 Уязвимость ruby | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
CVE-2025-61594 URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue. | CVSS3: 7.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-61594 URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue. | CVSS3: 6.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-61594 URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue. | CVSS3: 7.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-61594 URI Credential Leakage Bypass over CVE-2025-27221 | 0% Низкий | 3 месяца назад | ||
CVE-2025-61594 URI is a module providing classes to handle Uniform Resource Identifie ... | CVSS3: 7.5 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу