Search for vulnerabilities
Vulnerability details: VCID-z4sj-ns7c-aaaf
Vulnerability ID VCID-z4sj-ns7c-aaaf
Aliases CVE-2020-7595
GHSA-7553-jr98-vx47
Summary xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
generic_textual HIGH http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
generic_textual Low http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-7595.html
rhas Important https://access.redhat.com/errata/RHSA-2020:2644
rhas Important https://access.redhat.com/errata/RHSA-2020:2646
rhas Moderate https://access.redhat.com/errata/RHSA-2020:3996
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4479
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7595.json
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00313 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00313 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00313 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00365 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00496 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00496 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
epss 0.01127 https://api.first.org/data/v1/epss?cve=CVE-2020-7595
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1799786
cvssv3.1 7.5 https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
generic_textual HIGH https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595
cvssv3.1 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-7553-jr98-vx47
cvssv3.1 8.2 https://github.com/sparklemotion/nokogiri
generic_textual HIGH https://github.com/sparklemotion/nokogiri
cvssv3 7.5 https://github.com/sparklemotion/nokogiri/issues/1992
cvssv3.1 7.5 https://github.com/sparklemotion/nokogiri/issues/1992
generic_textual HIGH https://github.com/sparklemotion/nokogiri/issues/1992
cvssv3.1 7.5 https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
generic_textual HIGH https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2020-7595
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-7595
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-7595
archlinux Medium https://security.archlinux.org/AVG-1263
cvssv3.1 7.5 https://security.gentoo.org/glsa/202010-04
generic_textual HIGH https://security.gentoo.org/glsa/202010-04
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20200702-0005
generic_textual HIGH https://security.netapp.com/advisory/ntap-20200702-0005
generic_textual Low https://ubuntu.com/security/notices/USN-4274-1
cvssv3.1 7.5 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
generic_textual HIGH https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
cvssv3.1 7.5 https://usn.ubuntu.com/4274-1
generic_textual HIGH https://usn.ubuntu.com/4274-1
generic_textual Low https://usn.ubuntu.com/usn/usn-4274-1
cvssv3.1 5.3 https://www.oracle.com/security-alerts/cpuapr2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpuapr2022.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujul2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujul2020.html
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpujul2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpujul2022.html
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpuoct2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuoct2021.html
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-7595.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7595.json
https://api.first.org/data/v1/epss?cve=CVE-2020-7595
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/sparklemotion/nokogiri
https://github.com/sparklemotion/nokogiri/issues/1992
https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
https://security.gentoo.org/glsa/202010-04
https://security.netapp.com/advisory/ntap-20200702-0005
https://security.netapp.com/advisory/ntap-20200702-0005/
https://ubuntu.com/security/notices/USN-4274-1
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
https://usn.ubuntu.com/4274-1
https://usn.ubuntu.com/4274-1/
https://usn.ubuntu.com/usn/usn-4274-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
1799786 https://bugzilla.redhat.com/show_bug.cgi?id=1799786
949582 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949582
ASA-202011-15 https://security.archlinux.org/ASA-202011-15
AVG-1263 https://security.archlinux.org/AVG-1263
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:windows:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:symantec_netbackup:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:symantec_netbackup:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:real_user_experience_insight:13.3.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:real_user_experience_insight:13.3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:real_user_experience_insight:13.4.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:real_user_experience_insight:13.4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:real_user_experience_insight:13.5.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:real_user_experience_insight:13.5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.9.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
CVE-2020-7595 https://nvd.nist.gov/vuln/detail/CVE-2020-7595
CVE-2020-7595.YML https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2020-7595.yml
GHSA-7553-jr98-vx47 https://github.com/advisories/GHSA-7553-jr98-vx47
RHSA-2020:2644 https://access.redhat.com/errata/RHSA-2020:2644
RHSA-2020:2646 https://access.redhat.com/errata/RHSA-2020:2646
RHSA-2020:3996 https://access.redhat.com/errata/RHSA-2020:3996
RHSA-2020:4479 https://access.redhat.com/errata/RHSA-2020:4479
RHSA-2021:0949 https://access.redhat.com/errata/RHSA-2021:0949
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7595.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H Found at https://github.com/sparklemotion/nokogiri
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/sparklemotion/nokogiri/issues/1992
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-7595
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-7595
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-7595
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/202010-04
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.netapp.com/advisory/ntap-20200702-0005
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://usn.ubuntu.com/4274-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujul2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpujul2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuoct2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.39691
EPSS Score 0.00173
Published At May 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.