{"id":"CVE-2019-20005","details":"An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing a crafted XML file, performs incorrect memory handling, leading to a heap-based buffer over-read while running strchr() starting with a pointer after a '\\0' character (where the processing of a string was finished).","modified":"2026-04-15T23:59:31.437068114Z","published":"2019-12-26T22:15:10.797Z","related":["SUSE-SU-2021:3804-1","SUSE-SU-2021:3805-1","SUSE-SU-2021:3815-1","SUSE-SU-2021:3873-1","openSUSE-SU-2021:1505-1","openSUSE-SU-2021:3804-1","openSUSE-SU-2021:3805-1","openSUSE-SU-2021:3815-1","openSUSE-SU-2021:3873-1"],"references":[{"type":"REPORT","url":"https://sourceforge.net/p/ezxml/bugs/14/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-20005.json","unresolved_ranges":[{"events":[{"introduced":"0.8.3"},{"last_affected":"0.8.6"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}