Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-88-1 | ruby1.8 security update |
Debian DLA |
DLA-200-1 | ruby1.9.1 security update |
Debian DSA |
DSA-3157-1 | ruby1.9.1 security update |
Debian DSA |
DSA-3159-1 | ruby1.8 security update |
EUVD |
EUVD-2014-7937 | The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080. |
Ubuntu USN |
USN-2412-1 | Ruby vulnerability |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T13:10:50.067Z
Reserved: 2014-10-10T00:00:00.000Z
Link: CVE-2014-8090
No data.
Status : Modified
Published: 2014-11-21T15:59:04.243
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-8090
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN