Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-20004

Опубликовано: 10 дек. 2018
Источник: debian
EPSS Низкий

Описание

An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mxmlfixed2.12-2package
mxmlno-dsastretchpackage

Примечания

  • https://github.com/michaelrsweet/mxml/issues/233

  • Fixed by https://github.com/michaelrsweet/mxml/commit/4f5577dd4672d228e4180f06bdbd66f343ea45e0

EPSS

Процентиль: 72%
0.00711
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml.

CVSS3: 8.8
nvd
около 7 лет назад

An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml.

CVSS3: 8.8
github
больше 3 лет назад

An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml.

EPSS

Процентиль: 72%
0.00711
Низкий