Metrics
Affected Vendors & Products
Tue, 30 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 19 Sep 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruby-lang
Ruby-lang rexml |
|
| CPEs | cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:* | |
| Vendors & Products |
Ruby-lang
Ruby-lang rexml |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 18 Sep 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruby
Ruby rexml |
|
| Vendors & Products |
Ruby
Ruby rexml |
Thu, 18 Sep 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 17 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Sep 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities. | |
| Title | REXML has a DoS condition when parsing malformed XML file | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-17T17:45:58.118Z
Updated: 2025-09-17T17:54:00.334Z
Reserved: 2025-09-04T19:18:09.500Z
Link: CVE-2025-58767
Updated: 2025-09-17T17:53:14.220Z
Status : Analyzed
Published: 2025-09-17T18:15:52.857
Modified: 2025-09-30T13:07:07.207
Link: CVE-2025-58767