7.8
CVE-2025-24928
- EPSS 0.01%
- Published 18.02.2025 23:15:10
- Last modified 21.03.2025 18:15:34
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Vendorxmlsoft
≫
Product
libxml2
Default Statusunaffected
Version <
2.12.10
Version
0
Status
affected
Version <
2.13.6
Version
2.13.0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.006 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
cve@mitre.org | 7.8 | 1.4 | 5.8 |
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).