CVE-2025-24928
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
- T
Tim Bastin detected CVE-2025-24928 with a risk of 1.87
System updated the risk assessment from 1.87 to 1.25
System recalculated raw risk assessment
System updated the risk assessment from 1.25 to 3.75
System recalculated raw risk assessment
System updated the risk assessment from 1.87 to 3.75
System recalculated raw risk assessment
- T
Tim Bastin detected CVE-2025-24928 with a risk of 3.75
System detected CVE-2025-24928 with a risk of 3.75
System detected CVE-2025-24928 with a risk of 3.75
- T
Tim Bastin detected CVE-2025-24928 with a risk of 3.75
System fixed CVE-2025-24928
System fixed CVE-2025-24928
System fixed CVE-2025-24928
System fixed CVE-2025-24928
System fixed CVE-2025-24928
System fixed CVE-2025-24928
System detected CVE-2025-24928 with a risk of 3.75
Add a comment
Affected component
debian/libxml2