{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T06:51:33.153","vulnerabilities":[{"cve":{"id":"CVE-2024-35176","sourceIdentifier":"security-advisories@github.com","published":"2024-05-16T16:15:09.707","lastModified":"2025-11-03T21:16:11.330","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":" REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs."},{"lang":"es","value":" REXML es un conjunto de herramientas XML para Ruby. La gema REXML anterior a 3.2.6 tiene una vulnerabilidad de denegación de servicio cuando analiza un XML que tiene muchos `&lt;` en un valor de atributo. Aquellos que necesiten analizar archivos XML que no sean de confianza pueden verse afectados por esta vulnerabilidad. La gema REXML 3.2.7 o posterior incluye el parche para corregir esta vulnerabilidad. Como solución alternativa, no analice archivos XML que no sean de confianza."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"},{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*","versionEndExcluding":"3.2.7","matchCriteriaId":"EBF24ACB-780A-4611-B978-F93033207F85"}]}]}],"references":[{"url":"https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/ruby/rexml/commit/4325835f92f3f142ebd91a3fdba4e1f1ab7f1cfb","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20250306-0001/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}