Ezxml Project

Ezxml

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.33%
  • Veröffentlicht 17.05.2022 20:15:09
  • Zuletzt bearbeitet 21.11.2024 07:02:07

An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap out-of-bounds read.

  • EPSS 0.83%
  • Veröffentlicht 24.04.2021 17:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:58

An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap-based buffer overflow.

Exploit
  • EPSS 0.86%
  • Veröffentlicht 16.04.2021 18:15:13
  • Zuletzt bearbeitet 21.11.2024 06:05:28

An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (out-of-bounds read after a certain strcspn failure).

Exploit
  • EPSS 1.17%
  • Veröffentlicht 16.04.2021 18:15:13
  • Zuletzt bearbeitet 21.11.2024 06:05:28

An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (writing outside a memory region created by mmap).

Exploit
  • EPSS 1.85%
  • Veröffentlicht 15.04.2021 15:15:12
  • Zuletzt bearbeitet 21.11.2024 06:05:20

An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd() performs incorrect memory handling while parsing crafted XML files, which leads to an out-of-bounds write of a one byte constant.

Exploit
  • EPSS 1.46%
  • Veröffentlicht 11.04.2021 16:15:13
  • Zuletzt bearbeitet 21.11.2024 06:04:01

An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd(), while parsing a crafted XML file, performs incorrect memory handling, leading to a NULL pointer dereference while running strcmp() on a NULL pointer.

Exploit
  • EPSS 0.44%
  • Veröffentlicht 08.02.2021 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:55:56

The ezxml_toxml function in ezxml 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.

Exploit
  • EPSS 0.44%
  • Veröffentlicht 08.02.2021 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:55:56

The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.

Exploit
  • EPSS 0.44%
  • Veröffentlicht 08.02.2021 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:55:56

The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.

Exploit
  • EPSS 0.41%
  • Veröffentlicht 31.12.2019 21:15:12
  • Zuletzt bearbeitet 21.11.2024 04:38:11

An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content() tries to use realloc on a block that was not allocated, leading to an invalid free and segmentation fault.