Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-6497

Опубликовано: 23 июн. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tidy-html5unfixedpackage
tidy-html5postponedtrixiepackage
tidy-html5postponedbookwormpackage
tidy-html5postponedbullseyepackage

Примечания

  • https://github.com/htacg/tidy-html5/issues/1142

EPSS

Процентиль: 2%
0.00017
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 2 месяцев назад

A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
nvd
около 2 месяцев назад

A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
github
около 2 месяцев назад

A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 2%
0.00017
Низкий