-
Notifications
You must be signed in to change notification settings - Fork 5
Description
CVE-2015-8710
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
Affected component
The vulnerability is in pkg:deb/debian/[email protected]+dfsg-1.3~deb12u1
, detected by the github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning
scan.
Recommended fix
Upgrade to version 2.9.2+really2.9.1+dfsg1-0.1 or later.
Risk: 1.58 (Low)
EPSS: 2.44 %
The exploit probability is very low. The vulnerability is unlikely to be exploited in the next 30 days.
Exploit: Proof of Concept
A proof of concept is available for this vulnerability:
https://github.com/Karm/CVE-2015-8710
Vulnerability Depth: 3
The vulnerability is in a dependency of a dependency your project. It is 3 levels deep.
CVSS-BE: 9.8
- Exploiting this vulnerability significantly impacts availability.
- Exploiting this vulnerability significantly impacts integrity.
- Exploiting this vulnerability significantly impacts confidentiality.
CVSS-B: 9.8
- The vulnerability can be exploited over the network without needing physical access.
- It is easy for an attacker to exploit this vulnerability.
- An attacker does not need any special privileges or access rights.
- No user interaction is needed for the attacker to exploit this vulnerability.
- The impact is confined to the system where the vulnerability exists.
- There is a high impact on the confidentiality of the information.
- There is a high impact on the integrity of the data.
- There is a high impact on the availability of the system.
More details can be found in DevGuard
Slash Commands
You can use the following slash commands to interact with this vulnerability:
/accept <Justification>
or/a <Justification>
- Accept the risk/false-positive <Justification>
or/fp <Justification>
- Mark the risk as false positive/reopen <Justification>
or/r <Justification>
- Reopen the risk
Risk exceeds predefined threshold