Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2j9m-mc98-jvp7

Опубликовано: 29 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 1.9
CVSS3: 3.3

Описание

A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer overflow. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 6e27354466092a1ac65601e01ce6708710bb9fa5. A patch should be applied to remediate this issue.

A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer overflow. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 6e27354466092a1ac65601e01ce6708710bb9fa5. A patch should be applied to remediate this issue.

EPSS

Процентиль: 3%
0.00015
Низкий

1.9 Low

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 3.3
ubuntu
10 дней назад

A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer overflow. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 6e27354466092a1ac65601e01ce6708710bb9fa5. A patch should be applied to remediate this issue.

CVSS3: 3.3
nvd
10 дней назад

A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer overflow. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 6e27354466092a1ac65601e01ce6708710bb9fa5. A patch should be applied to remediate this issue.

CVSS3: 3.3
debian
10 дней назад

A vulnerability was determined in mxml up to 4.0.4. This issue affects ...

EPSS

Процентиль: 3%
0.00015
Низкий

1.9 Low

CVSS4

3.3 Low

CVSS3

Дефекты

CWE-119