{"id":"CVE-2015-3451","details":"The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.","modified":"2026-04-16T01:39:37.314582415Z","published":"2015-05-12T19:59:21Z","withdrawn":"2026-01-27T04:15:00.744020Z","related":["SUSE-SU-2015:1439-1","openSUSE-SU-2024:10516-1"],"references":[{"type":"ADVISORY","url":"http://advisories.mageia.org/MGASA-2015-0199.html"},{"type":"ADVISORY","url":"http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/Changes"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157448.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157740.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2015-09/msg00006.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3243"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:231"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/04/25/2"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/04/30/1"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/74333"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2592-1"},{"type":"ADVISORY","url":"https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30/raw/"}],"schema_version":"1.7.3"}