Количество 42
Количество 42
CVE-2025-49795
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
CVE-2025-49795
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
CVE-2025-49795
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
CVE-2025-49795
Libxml: null pointer dereference leads to denial of service (dos)
CVE-2025-49795
A NULL pointer dereference vulnerability was found in libxml2 when pro ...
GHSA-gg7j-w83p-fxr9
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
BDU:2025-08977
Уязвимость функции xmlSchematronFormatReport() компонента Schematron Schema Report библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2025-6021
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
CVE-2025-6021
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
CVE-2025-6021
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
CVE-2025-6021
Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2
CVE-2025-6021
A flaw was found in libxml2's xmlBuildQName function, where integer ov ...
CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
CVE-2025-49796
Libxml: type confusion leads to denial of service (dos)
CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elem ...
GHSA-83xx-9f6p-vwfj
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
GHSA-32vr-5hxf-x93f
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
BDU:2025-08978
Уязвимость функции xmlSchematronFormatReport() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-49795 A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service. | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-49795 A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service. | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-49795 A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service. | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-49795 Libxml: null pointer dereference leads to denial of service (dos) | CVSS3: 7.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-49795 A NULL pointer dereference vulnerability was found in libxml2 when pro ... | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
GHSA-gg7j-w83p-fxr9 A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service. | CVSS3: 7.5 | 0% Низкий | 6 месяцев назад | |
BDU:2025-08977 Уязвимость функции xmlSchematronFormatReport() компонента Schematron Schema Report библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
CVE-2025-6021 A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. | CVSS3: 7.5 | 1% Низкий | 6 месяцев назад | |
CVE-2025-6021 A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. | CVSS3: 7.5 | 1% Низкий | 6 месяцев назад | |
CVE-2025-6021 A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. | CVSS3: 7.5 | 1% Низкий | 6 месяцев назад | |
CVE-2025-6021 Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2 | CVSS3: 7.5 | 1% Низкий | 5 месяцев назад | |
CVE-2025-6021 A flaw was found in libxml2's xmlBuildQName function, where integer ov ... | CVSS3: 7.5 | 1% Низкий | 6 месяцев назад | |
CVE-2025-49796 A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. | CVSS3: 9.1 | 0% Низкий | 6 месяцев назад | |
CVE-2025-49796 A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. | CVSS3: 9.1 | 0% Низкий | 6 месяцев назад | |
CVE-2025-49796 A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. | CVSS3: 9.1 | 0% Низкий | 6 месяцев назад | |
CVE-2025-49796 Libxml: type confusion leads to denial of service (dos) | CVSS3: 9.1 | 0% Низкий | 5 месяцев назад | |
CVE-2025-49796 A vulnerability was found in libxml2. Processing certain sch:name elem ... | CVSS3: 9.1 | 0% Низкий | 6 месяцев назад | |
GHSA-83xx-9f6p-vwfj A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. | CVSS3: 9.1 | 0% Низкий | 6 месяцев назад | |
GHSA-32vr-5hxf-x93f A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. | CVSS3: 7.5 | 1% Низкий | 6 месяцев назад | |
BDU:2025-08978 Уязвимость функции xmlSchematronFormatReport() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 9.1 | 0% Низкий | 7 месяцев назад |
Уязвимостей на страницу