Redhat

Jboss Core Services

41 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 02.02.2026 12:38:14
  • Zuletzt bearbeitet 03.02.2026 16:44:36

A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the ...

  • EPSS 0.07%
  • Veröffentlicht 15.01.2026 14:20:24
  • Zuletzt bearbeitet 16.01.2026 15:55:33

A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this...

  • EPSS 0.06%
  • Veröffentlicht 15.01.2026 14:20:23
  • Zuletzt bearbeitet 16.01.2026 15:55:33

A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schem...

  • EPSS 0.18%
  • Veröffentlicht 15.01.2026 14:20:06
  • Zuletzt bearbeitet 16.01.2026 15:55:33

A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit th...

  • EPSS 0.07%
  • Veröffentlicht 07.11.2025 20:59:35
  • Zuletzt bearbeitet 20.11.2025 15:17:23

Rejected reason: This CVE was assigned for a libxml2 issue#1012 but later deemed not valid. Ref.: https://gitlab.gnome.org/GNOME/libxml2/-/issues/1012#note_2608283

  • EPSS 0.07%
  • Veröffentlicht 16.06.2025 15:24:31
  • Zuletzt bearbeitet 22.01.2026 05:16:11

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malic...

  • EPSS 0.02%
  • Veröffentlicht 16.06.2025 15:24:05
  • Zuletzt bearbeitet 03.11.2025 20:19:18

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow...

  • EPSS 0.15%
  • Veröffentlicht 16.06.2025 15:19:29
  • Zuletzt bearbeitet 27.10.2025 18:15:41

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

  • EPSS 0.5%
  • Veröffentlicht 16.06.2025 15:14:28
  • Zuletzt bearbeitet 22.01.2026 05:16:11

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a d...

Medienbericht Exploit
  • EPSS 0.64%
  • Veröffentlicht 12.06.2025 12:49:16
  • Zuletzt bearbeitet 29.11.2025 01:16:03

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.