Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings
CVE-2015-7499

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Heap-based buffer overflow in nokogiri

Moderate severity GitHub Reviewed PublishedSep 17, 2018 to the GitHub Advisory Database • UpdatedJul 5, 2023

Package

bundlernokogiri (RubyGems)

Affected versions

>= 1.6.0, <= 1.6.7.1

Patched versions

1.6.7.2

Description

Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or crash the application.

References

Published by theNational Vulnerability DatabaseDec 15, 2015
Published to the GitHub Advisory DatabaseSep 17, 2018
ReviewedJun 16, 2020
Last updatedJul 5, 2023

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided byFIRST.
(86th percentile)

Weaknesses

Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Learn more on MITRE.

CVE ID

CVE-2015-7499

GHSA ID

GHSA-jxjr-5h69-qw3w

Source code

No known source code
LoadingChecking history
See something to contribute?Suggest improvements for this vulnerability.

[8]ページ先頭

©2009-2025 Movatter.jp