Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libxml2@2.9.2%2Breally2.9.1%2Bdfsg1-0.1?distro=trixie
Typedeb
Namespacedebian
Namelibxml2
Version2.9.2+really2.9.1+dfsg1-0.1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.9.2+zdfsg1-4
Latest_non_vulnerable_version2.15.2+dfsg-0.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6h9f-6pmg-3fh3
vulnerability_id VCID-6h9f-6pmg-3fh3
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
libxml2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
4
reference_url http://marc.info/?l=bugtraq&m=145382616617563&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145382616617563&w=2
5
reference_url http://rhn.redhat.com/errata/RHSA-2015-2549.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2549.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2015-2550.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2550.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1089.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1089.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7941.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7941.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7941
reference_id
reference_type
scores
0
value 0.00492
scoring_system epss
scoring_elements 0.65587
published_at 2026-04-02T12:55:00Z
1
value 0.00492
scoring_system epss
scoring_elements 0.65538
published_at 2026-04-01T12:55:00Z
2
value 0.00492
scoring_system epss
scoring_elements 0.65617
published_at 2026-04-04T12:55:00Z
3
value 0.00545
scoring_system epss
scoring_elements 0.67843
published_at 2026-04-26T12:55:00Z
4
value 0.00545
scoring_system epss
scoring_elements 0.67814
published_at 2026-04-21T12:55:00Z
5
value 0.00545
scoring_system epss
scoring_elements 0.67834
published_at 2026-04-24T12:55:00Z
6
value 0.00545
scoring_system epss
scoring_elements 0.67744
published_at 2026-04-07T12:55:00Z
7
value 0.00545
scoring_system epss
scoring_elements 0.67795
published_at 2026-04-08T12:55:00Z
8
value 0.00545
scoring_system epss
scoring_elements 0.67809
published_at 2026-04-09T12:55:00Z
9
value 0.00545
scoring_system epss
scoring_elements 0.67833
published_at 2026-04-18T12:55:00Z
10
value 0.00545
scoring_system epss
scoring_elements 0.6782
published_at 2026-04-16T12:55:00Z
11
value 0.00545
scoring_system epss
scoring_elements 0.67784
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7941
10
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=744980
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=744980
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489
reference_id
reference_type
scores
url https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489
25
reference_url https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31
reference_id
reference_type
scores
url https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31
26
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
27
reference_url http://www.debian.org/security/2015/dsa-3430
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3430
28
reference_url http://www.openwall.com/lists/oss-security/2015/10/22/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/22/5
29
reference_url http://www.openwall.com/lists/oss-security/2015/10/22/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/22/8
30
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
31
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
32
reference_url http://www.securityfocus.com/bid/74241
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/74241
33
reference_url http://www.securitytracker.com/id/1034243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034243
34
reference_url http://www.ubuntu.com/usn/USN-2812-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2812-1
35
reference_url http://xmlsoft.org/news.html
reference_id
reference_type
scores
url http://xmlsoft.org/news.html
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274222
reference_id 1274222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274222
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783010
reference_id 783010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783010
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7941
reference_id CVE-2015-7941
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7941
43
reference_url https://security.gentoo.org/glsa/201701-37
reference_id GLSA-201701-37
reference_type
scores
url https://security.gentoo.org/glsa/201701-37
44
reference_url https://access.redhat.com/errata/RHSA-2015:2549
reference_id RHSA-2015:2549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2549
45
reference_url https://access.redhat.com/errata/RHSA-2015:2550
reference_id RHSA-2015:2550
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2550
46
reference_url https://access.redhat.com/errata/RHSA-2016:1089
reference_id RHSA-2016:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1089
47
reference_url https://usn.ubuntu.com/2812-1/
reference_id USN-2812-1
reference_type
scores
url https://usn.ubuntu.com/2812-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.2%2Breally2.9.1%2Bdfsg1-0.1?distro=trixie
purl pkg:deb/debian/libxml2@2.9.2%2Breally2.9.1%2Bdfsg1-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.2%252Breally2.9.1%252Bdfsg1-0.1%3Fdistro=trixie
1
url pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.10%252Bdfsg-6.7%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5?distro=trixie
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5%3Fdistro=trixie
3
url pkg:deb/debian/libxml2@2.12.7%2Bdfsg%2Breally2.9.14-2.1%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/libxml2@2.12.7%2Bdfsg%2Breally2.9.14-2.1%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.12.7%252Bdfsg%252Breally2.9.14-2.1%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/libxml2@2.15.2%2Bdfsg-0.1?distro=trixie
purl pkg:deb/debian/libxml2@2.15.2%2Bdfsg-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.15.2%252Bdfsg-0.1%3Fdistro=trixie
aliases CVE-2015-7941
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6h9f-6pmg-3fh3
1
url VCID-b5tz-9s1v-pkg7
vulnerability_id VCID-b5tz-9s1v-pkg7
summary
Vulnerabilities in libxml2 and libxslt
Several vulnerabilities were discovered in the libxml2 and libxslt libraries that this package gem depends on.
references
0
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
2
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
3
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1419.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1419.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-2550.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-2550.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1819.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1819
reference_id
reference_type
scores
0
value 0.01944
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-26T12:55:00Z
1
value 0.01944
scoring_system epss
scoring_elements 0.83402
published_at 2026-04-07T12:55:00Z
2
value 0.01944
scoring_system epss
scoring_elements 0.83426
published_at 2026-04-08T12:55:00Z
3
value 0.01944
scoring_system epss
scoring_elements 0.83437
published_at 2026-04-09T12:55:00Z
4
value 0.01944
scoring_system epss
scoring_elements 0.83451
published_at 2026-04-11T12:55:00Z
5
value 0.01944
scoring_system epss
scoring_elements 0.83445
published_at 2026-04-12T12:55:00Z
6
value 0.01944
scoring_system epss
scoring_elements 0.83441
published_at 2026-04-13T12:55:00Z
7
value 0.01944
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-16T12:55:00Z
8
value 0.01944
scoring_system epss
scoring_elements 0.83477
published_at 2026-04-18T12:55:00Z
9
value 0.01944
scoring_system epss
scoring_elements 0.83478
published_at 2026-04-21T12:55:00Z
10
value 0.01944
scoring_system epss
scoring_elements 0.83501
published_at 2026-04-24T12:55:00Z
11
value 0.01997
scoring_system epss
scoring_elements 0.83579
published_at 2026-04-01T12:55:00Z
12
value 0.01997
scoring_system epss
scoring_elements 0.83606
published_at 2026-04-04T12:55:00Z
13
value 0.01997
scoring_system epss
scoring_elements 0.83591
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1819
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710
24
reference_url https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9
25
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-1819.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-1819.yml
26
reference_url https://github.com/sparklemotion/nokogiri/commit/8f3de6d88d0da11fb62a45daa61b85ce71b4af59
reference_id
reference_type
scores
url https://github.com/sparklemotion/nokogiri/commit/8f3de6d88d0da11fb62a45daa61b85ce71b4af59
27
reference_url https://github.com/sparklemotion/nokogiri/issues/1374
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/sparklemotion/nokogiri/issues/1374
28
reference_url https://github.com/sparklemotion/nokogiri/pull/1376
reference_id
reference_type
scores
url https://github.com/sparklemotion/nokogiri/pull/1376
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-1819
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-1819
30
reference_url https://security.gentoo.org/glsa/201507-08
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201507-08
31
reference_url https://support.apple.com/HT206166
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://support.apple.com/HT206166
32
reference_url https://support.apple.com/HT206167
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://support.apple.com/HT206167
33
reference_url https://support.apple.com/HT206168
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://support.apple.com/HT206168
34
reference_url https://support.apple.com/HT206169
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://support.apple.com/HT206169
35
reference_url http://www.debian.org/security/2015/dsa-3430
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2015/dsa-3430
36
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
37
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
38
reference_url http://www.ubuntu.com/usn/USN-2812-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2812-1
39
reference_url http://xmlsoft.org/news.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://xmlsoft.org/news.html
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211278
reference_id 1211278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211278
41
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782782
reference_id 782782
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782782
42
reference_url https://github.com/advisories/GHSA-q7wx-62r7-j2x7
reference_id GHSA-q7wx-62r7-j2x7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q7wx-62r7-j2x7
43
reference_url https://security.gentoo.org/glsa/201701-37
reference_id GLSA-201701-37
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201701-37
44
reference_url https://access.redhat.com/errata/RHSA-2015:1419
reference_id RHSA-2015:1419
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1419
45
reference_url https://access.redhat.com/errata/RHSA-2015:2550
reference_id RHSA-2015:2550
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2550
46
reference_url https://usn.ubuntu.com/2812-1/
reference_id USN-2812-1
reference_type
scores
url https://usn.ubuntu.com/2812-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.2%2Breally2.9.1%2Bdfsg1-0.1?distro=trixie
purl pkg:deb/debian/libxml2@2.9.2%2Breally2.9.1%2Bdfsg1-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.2%252Breally2.9.1%252Bdfsg1-0.1%3Fdistro=trixie
1
url pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.10%252Bdfsg-6.7%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5?distro=trixie
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5%3Fdistro=trixie
3
url pkg:deb/debian/libxml2@2.12.7%2Bdfsg%2Breally2.9.14-2.1%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/libxml2@2.12.7%2Bdfsg%2Breally2.9.14-2.1%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.12.7%252Bdfsg%252Breally2.9.14-2.1%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/libxml2@2.15.2%2Bdfsg-0.1?distro=trixie
purl pkg:deb/debian/libxml2@2.15.2%2Bdfsg-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.15.2%252Bdfsg-0.1%3Fdistro=trixie
aliases CVE-2015-1819, GHSA-q7wx-62r7-j2x7
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5tz-9s1v-pkg7
2
url VCID-cgfv-pps6-6khd
vulnerability_id VCID-cgfv-pps6-6khd
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1089.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1089.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8710.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8710.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8710
reference_id
reference_type
scores
0
value 0.04711
scoring_system epss
scoring_elements 0.89404
published_at 2026-04-26T12:55:00Z
1
value 0.04711
scoring_system epss
scoring_elements 0.89382
published_at 2026-04-21T12:55:00Z
2
value 0.04711
scoring_system epss
scoring_elements 0.894
published_at 2026-04-24T12:55:00Z
3
value 0.04711
scoring_system epss
scoring_elements 0.89329
published_at 2026-04-01T12:55:00Z
4
value 0.04711
scoring_system epss
scoring_elements 0.89334
published_at 2026-04-02T12:55:00Z
5
value 0.04711
scoring_system epss
scoring_elements 0.89346
published_at 2026-04-04T12:55:00Z
6
value 0.04711
scoring_system epss
scoring_elements 0.89348
published_at 2026-04-07T12:55:00Z
7
value 0.04711
scoring_system epss
scoring_elements 0.89365
published_at 2026-04-08T12:55:00Z
8
value 0.04711
scoring_system epss
scoring_elements 0.89369
published_at 2026-04-09T12:55:00Z
9
value 0.04711
scoring_system epss
scoring_elements 0.89377
published_at 2026-04-11T12:55:00Z
10
value 0.04711
scoring_system epss
scoring_elements 0.89374
published_at 2026-04-12T12:55:00Z
11
value 0.04711
scoring_system epss
scoring_elements 0.89371
published_at 2026-04-13T12:55:00Z
12
value 0.04711
scoring_system epss
scoring_elements 0.89386
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8710
3
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=746048
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=746048
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
reference_id
reference_type
scores
url https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
18
reference_url https://hackerone.com/reports/57125#activity-384861
reference_id
reference_type
scores
url https://hackerone.com/reports/57125#activity-384861
19
reference_url http://www.debian.org/security/2015/dsa-3430
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3430
20
reference_url http://www.openwall.com/lists/oss-security/2015/04/19/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/04/19/4
21
reference_url http://www.openwall.com/lists/oss-security/2015/09/13/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/13/1
22
reference_url http://www.openwall.com/lists/oss-security/2015/12/31/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/31/7
23
reference_url http://www.securityfocus.com/bid/79811
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79811
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213957
reference_id 1213957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213957
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782985
reference_id 782985
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782985
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8710
reference_id CVE-2015-8710
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8710
31
reference_url https://access.redhat.com/errata/RHSA-2015:2549
reference_id RHSA-2015:2549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2549
32
reference_url https://access.redhat.com/errata/RHSA-2015:2550
reference_id RHSA-2015:2550
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2550
33
reference_url https://access.redhat.com/errata/RHSA-2016:1089
reference_id RHSA-2016:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1089
34
reference_url https://usn.ubuntu.com/2875-1/
reference_id USN-2875-1
reference_type
scores
url https://usn.ubuntu.com/2875-1/
fixed_packages
0
url pkg:deb/debian/libxml2@2.9.2%2Breally2.9.1%2Bdfsg1-0.1?distro=trixie
purl pkg:deb/debian/libxml2@2.9.2%2Breally2.9.1%2Bdfsg1-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.2%252Breally2.9.1%252Bdfsg1-0.1%3Fdistro=trixie
1
url pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.10%252Bdfsg-6.7%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5?distro=trixie
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5%3Fdistro=trixie
3
url pkg:deb/debian/libxml2@2.12.7%2Bdfsg%2Breally2.9.14-2.1%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/libxml2@2.12.7%2Bdfsg%2Breally2.9.14-2.1%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.12.7%252Bdfsg%252Breally2.9.14-2.1%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/libxml2@2.15.2%2Bdfsg-0.1?distro=trixie
purl pkg:deb/debian/libxml2@2.15.2%2Bdfsg-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.15.2%252Bdfsg-0.1%3Fdistro=trixie
aliases CVE-2015-8710
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgfv-pps6-6khd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.2%252Breally2.9.1%252Bdfsg1-0.1%3Fdistro=trixie