Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Michaelrsweet
Michaelrsweet mxml |
|
| Vendors & Products |
Michaelrsweet
Michaelrsweet mxml |
Sun, 29 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer overflow. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 6e27354466092a1ac65601e01ce6708710bb9fa5. A patch should be applied to remediate this issue. | |
| Title | mxml mxmlIndexNew mxml-index.c index_sort stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-01T14:32:02.218Z
Reserved: 2026-03-27T16:23:50.496Z
Link: CVE-2026-5037
Updated: 2026-04-01T14:31:58.351Z
Status : Deferred
Published: 2026-03-29T09:15:56.340
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-5037
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:58:32Z