{"api_version":"1","generated_at":"2026-04-23T01:33:33+00:00","cve":"CVE-2024-25062","urls":{"html":"https://cve.report/CVE-2024-25062","api":"https://cve.report/api/cve/CVE-2024-25062.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-25062","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-25062"},"summary":{"title":"CVE-2024-25062","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2024-02-04 16:15:00","updated_at":"2024-02-05 02:09:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/tags","name":"https://gitlab.gnome.org/GNOME/libxml2/-/tags","refsource":"","tags":[],"title":"Tags · GNOME / libxml2 · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/604","name":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/604","refsource":"","tags":[],"title":"[CVE-2024-25062] Use-after-free in xmlValidatePopElement() using XMLReader API (#604) · Issues · GNOME / libxml2 · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-25062","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25062","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-25062","qid":"200139","title":"Ubuntu Security Notification for libxml2 Vulnerability (USN-6658-1)"},{"cve":"CVE-2024-25062","qid":"200181","title":"Ubuntu Security Notification for libxml2 Vulnerability (USN-6658-2)"},{"cve":"CVE-2024-25062","qid":"510733","title":"Alpine Linux Security Update for libxml2"},{"cve":"CVE-2024-25062","qid":"510791","title":"Alpine Linux Security Update for qt6-qtwebengine"},{"cve":"CVE-2024-25062","qid":"674120","title":"EulerOS Security Update for libxml2 (EulerOS-SA-2024-1489)"},{"cve":"CVE-2024-25062","qid":"674124","title":"EulerOS Security Update for libxml2 (EulerOS-SA-2024-1510)"},{"cve":"CVE-2024-25062","qid":"691448","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for electron{27,28} (e74da31b-276a-4a22-9772-17dd42b97559)"},{"cve":"CVE-2024-25062","qid":"710860","title":"Gentoo Linux libxml2 Multiple Vulnerabilities (GLSA 202402-11)"},{"cve":"CVE-2024-25062","qid":"755744","title":"SUSE Enterprise Linux Security Update for libxml2 (SUSE-SU-2024:0461-1)"},{"cve":"CVE-2024-25062","qid":"755794","title":"SUSE Enterprise Linux Security Update for libxml2 (SUSE-SU-2024:0556-1)"},{"cve":"CVE-2024-25062","qid":"755795","title":"SUSE Enterprise Linux Security Update for libxml2 (SUSE-SU-2024:0555-1)"},{"cve":"CVE-2024-25062","qid":"755836","title":"SUSE Enterprise Linux Security Update for libxml2 (SUSE-SU-2024:0613-1)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2024-02-04 16:15:00","lastModifiedDate":"2024-02-05 02:09:00","problem_types":[],"metrics":[],"configurations":{"CVE_data_version":"4.0","nodes":[]}},"legacy_mitre":{"record":null,"notes":[]}}}