
Cloud Vulnerability DB
A community-led vulnerabilities database
libpspp-core.a in GNU PSPP through version 2.0.1 contains a vulnerability that was discovered on May 3, 2025, and publicly disclosed on May 10, 2025. The issue allows attackers to cause an out-of-bounds read in the spvxmlparseattributes function within spvxml-helpers.c, specifically when handling extra content at the end of a document (Wiz Report, NVD).
The vulnerability is classified as an out-of-bounds read (CWE-125) that occurs in the spvxmlparseattributes function within spvxml-helpers.c. According to the CVSS v3.1 scoring, it has received a base score of 2.9 (LOW) with the vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L, indicating local access, high attack complexity, no privileges required, and low availability impact (NVD).
The vulnerability affects system availability by causing a segmentation fault when processing malformed XML documents. The impact is considered low as it requires local access and has no direct effect on confidentiality or integrity of the system (Wiz Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."