Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-6021

Опубликовано: 29 июл. 2025
Источник: msrc
CVSS3: 7.5
EPSS Низкий

Описание

Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2

EPSS

Процентиль: 67%
0.00546
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
5 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
redhat
5 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
nvd
5 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
debian
5 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer ov ...

CVSS3: 7.5
github
5 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

EPSS

Процентиль: 67%
0.00546
Низкий

7.5 High

CVSS3