Executive Summary

Informations
Name CVE-2024-39908 First vendor Publication 2024-07-16
Vendor Cve Last vendor Modification 2024-07-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39908

Sources (Detail)

https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8
https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-07-17 17:27:23
  • Multiple Updates
2024-07-17 00:27:21
  • First insertion