Libexpat Project

Libexpat

40 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.51%
  • Published 16.06.2016 18:59:10
  • Last modified 12.04.2025 10:46:40

The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists beca...

  • EPSS 0.54%
  • Published 16.06.2016 18:59:00
  • Last modified 12.04.2025 10:46:40

Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.

  • EPSS 1.5%
  • Published 26.05.2016 16:59:00
  • Last modified 12.04.2025 10:46:40

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

  • EPSS 0.63%
  • Published 23.07.2015 00:59:12
  • Last modified 12.04.2025 10:46:40

Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspec...

Exploit
  • EPSS 0.04%
  • Published 21.01.2014 18:55:09
  • Last modified 11.04.2025 00:51:21

expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to i...

  • EPSS 1.44%
  • Published 03.07.2012 19:55:02
  • Last modified 11.04.2025 00:51:21

Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation...

  • EPSS 1.15%
  • Published 03.07.2012 19:55:02
  • Last modified 11.04.2025 00:51:21

readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.

  • EPSS 0.3%
  • Published 03.07.2012 19:55:02
  • Last modified 11.04.2025 00:51:21

The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file wit...

Exploit
  • EPSS 2.83%
  • Published 04.12.2009 21:30:00
  • Last modified 09.04.2025 00:30:58

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that ...

Exploit
  • EPSS 1.77%
  • Published 03.11.2009 16:30:12
  • Last modified 09.04.2025 00:30:58

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafte...