Search for vulnerabilities
Vulnerability details: VCID-4z87-yfha-aaaq
Vulnerability ID VCID-4z87-yfha-aaaq
Aliases CVE-2023-39615
Summary ** DISPUTED ** Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
Status Disputed
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39615.json
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.0012 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00273 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
epss 0.00549 https://api.first.org/data/v1/epss?cve=CVE-2023-39615
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2023-39615
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2023-39615
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39615.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-39615
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-39615
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.28264
EPSS Score 0.00063
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2025-04-19T16:07:27.097734+00:00 NVD CVE Status Improver Improve https://cveawg.mitre.org/api/cve/CVE-2023-39615 36.0.0