CVE-2025-9714
- EPSS 0.02%
- Veröffentlicht 10.09.2025 18:43:12
- Zuletzt bearbeitet 03.11.2025 19:16:17
Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions `xmlXPathRunEval`, `xmlXPathCtxtCompile`, and `xmlXPathEval...
CVE-2025-6170
- EPSS 0.02%
- Veröffentlicht 16.06.2025 15:24:05
- Zuletzt bearbeitet 03.11.2025 20:19:18
A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow...
CVE-2025-6021
- EPSS 0.58%
- Veröffentlicht 12.06.2025 12:49:16
- Zuletzt bearbeitet 29.11.2025 01:16:03
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
CVE-2025-32415
- EPSS 0.02%
- Veröffentlicht 17.04.2025 00:00:00
- Zuletzt bearbeitet 03.11.2025 20:18:27
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a ...
CVE-2025-32414
- EPSS 0.04%
- Veröffentlicht 08.04.2025 03:15:15
- Zuletzt bearbeitet 03.11.2025 20:18:27
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference betwe...
CVE-2025-27113
- EPSS 0.18%
- Veröffentlicht 18.02.2025 23:15:10
- Zuletzt bearbeitet 03.11.2025 22:18:43
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.
CVE-2025-24928
- EPSS 0.03%
- Veröffentlicht 18.02.2025 23:15:10
- Zuletzt bearbeitet 03.11.2025 22:18:40
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
CVE-2024-56171
- EPSS 0.04%
- Veröffentlicht 18.02.2025 22:15:12
- Zuletzt bearbeitet 03.11.2025 21:17:50
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity...
CVE-2022-49043
- EPSS 0.03%
- Veröffentlicht 26.01.2025 06:15:21
- Zuletzt bearbeitet 03.11.2025 21:15:55
xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.
CVE-2024-40896
- EPSS 0.45%
- Veröffentlicht 23.12.2024 17:15:08
- Zuletzt bearbeitet 25.11.2025 13:32:32
In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attacks possi...