Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3451

Опубликовано: 12 мая 2015
Источник: debian
EPSS Низкий

Описание

The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxml-libxml-perlfixed2.0116+dfsg-2package

Примечания

  • https://www.openwall.com/lists/oss-security/2015/04/25/2

  • https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30

  • https://bitbucket.org/shlomif/perl-xml-libxml/commits/915f1dbaf21c5f3c21d7c519c70fd93859e47152

EPSS

Процентиль: 89%
0.04979
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.

redhat
почти 11 лет назад

The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.

nvd
больше 10 лет назад

The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.

suse-cvrf
больше 10 лет назад

Security update for perl-XML-LibXML

github
больше 3 лет назад

The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.

EPSS

Процентиль: 89%
0.04979
Низкий