{"vulnerability": "CVE-2024-41946", "sightings": [{"uuid": "aee4a9f5-5cba-4e8d-8d1f-94c51f821814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41946", "type": "seen", "source": "https://gist.github.com/alex-aizman/e37d58b44d071bb27940f4db465b3263", "content": "", "creation_timestamp": "2025-05-19T14:17:45.000000Z"}, {"uuid": "57ab4ac8-f0f5-4935-b3d1-20124275bb9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41946", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeuxkcgj2c", "content": "", "creation_timestamp": "2025-09-30T01:31:30.781151Z"}, {"uuid": "0941b30e-6ab8-42b0-8a12-e325581b033e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41946", "type": "seen", "source": "https://t.me/cvedetector/2234", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41946 - REXML XML Toolkit DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41946 \nPublished : Aug. 1, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-01T17:55:48.000000Z"}]}