Количество 30
Количество 30
CVE-2025-6021
A flaw was found in libxml2's xmlBuildQName function, where integer ov ...

CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

CVE-2025-49796
CVE-2025-49796
A vulnerability was found in libxml2. Processing certain sch:name elem ...
GHSA-83xx-9f6p-vwfj
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
GHSA-32vr-5hxf-x93f
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

BDU:2025-08978
Уязвимость функции xmlSchematronFormatReport() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании

BDU:2025-07144
Уязвимость функции xmlBuildQName библиотеки Libxml2, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
CVE-2025-6021 A flaw was found in libxml2's xmlBuildQName function, where integer ov ... | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
![]() | CVE-2025-49796 A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. | CVSS3: 9.1 | 0% Низкий | около 2 месяцев назад |
![]() | CVE-2025-49796 A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. | CVSS3: 9.1 | 0% Низкий | около 2 месяцев назад |
![]() | CVE-2025-49796 A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. | CVSS3: 9.1 | 0% Низкий | около 2 месяцев назад |
![]() | CVSS3: 9.1 | 0% Низкий | 9 дней назад | |
CVE-2025-49796 A vulnerability was found in libxml2. Processing certain sch:name elem ... | CVSS3: 9.1 | 0% Низкий | около 2 месяцев назад | |
GHSA-83xx-9f6p-vwfj A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. | CVSS3: 9.1 | 0% Низкий | около 2 месяцев назад | |
GHSA-32vr-5hxf-x93f A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
![]() | BDU:2025-08978 Уязвимость функции xmlSchematronFormatReport() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 9.1 | 0% Низкий | 2 месяца назад |
![]() | BDU:2025-07144 Уязвимость функции xmlBuildQName библиотеки Libxml2, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад |
Уязвимостей на страницу