CVE-2025-6069

The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.

Open
LOW (2.3)
  • logo

    System detected CVE-2025-6069 with a risk of 1

  • logo

    System detected CVE-2025-6069 with a risk of 1

  • logo

    System detected CVE-2025-6069 with a risk of 1

  • logo

    System detected CVE-2025-6069 with a risk of 1

  • logo

    System detected CVE-2025-6069 with a risk of 2

  • logo

    System detected CVE-2025-6069 with a risk of 1

  • logo

    System updated the risk assessment from 1 to 2

    System recalculated raw risk assessment

  • T

    Tim Bastin fixed CVE-2025-6069

  • logo

    System updated the risk assessment from 1 to 2

    System recalculated raw risk assessment

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 2 to 2.29

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 2 to 2.29

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 2 to 2.29

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1 to 1.14

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 2.29 to 1.14

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 2.29 to 1.14

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System fixed CVE-2025-6069

  • logo

    System detected CVE-2025-6069 with a risk of 1.14

  • logo

    System updated the risk assessment from 1.14 to 2.29

    System recalculated raw risk assessment

Add a comment

Mark as False Positive
Last calculated at:

Affected component

debian/python3.11

Installed version:
3.11.2-6
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 2ab7b793efd72421aea8c3a994ac60202bf1b3a5