Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-6497

Опубликовано: 23 июн. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tidy-html5unfixedpackage
tidy-html5postponedtrixiepackage
tidy-html5postponedbookwormpackage
tidy-html5postponedbullseyepackage

Примечания

  • https://github.com/htacg/tidy-html5/issues/1142

EPSS

Процентиль: 2%
0.00013
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
6 месяцев назад

A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

CVSS3: 3.3
nvd
6 месяцев назад

A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

msrc
4 месяца назад

HTACG tidy-html5 parser.c prvTidyParseNamespace assertion

CVSS3: 3.3
github
6 месяцев назад

A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 2%
0.00013
Низкий