Libexpat Project

Libexpat

40 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.38%
  • Published 10.01.2022 14:12:56
  • Last modified 05.05.2025 17:17:53

defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

  • EPSS 0.38%
  • Published 10.01.2022 14:12:56
  • Last modified 05.05.2025 17:17:52

build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

  • EPSS 1.17%
  • Published 10.01.2022 14:12:56
  • Last modified 05.05.2025 17:17:52

addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

Exploit
  • EPSS 4.09%
  • Published 06.01.2022 04:15:07
  • Last modified 05.05.2025 17:17:28

In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.

Exploit
  • EPSS 0.37%
  • Published 01.01.2022 19:15:08
  • Last modified 05.05.2025 17:17:28

In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).

Exploit
  • EPSS 0.24%
  • Published 04.09.2019 06:15:10
  • Last modified 30.05.2025 20:15:23

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-r...

Exploit
  • EPSS 5.82%
  • Published 24.06.2019 17:15:09
  • Last modified 30.05.2025 20:15:20

In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).

  • EPSS 0.02%
  • Published 30.07.2017 14:29:00
  • Last modified 20.04.2025 01:37:25

The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka D...

Exploit
  • EPSS 0.16%
  • Published 25.07.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.

  • EPSS 1.68%
  • Published 30.06.2016 17:59:04
  • Last modified 12.04.2025 10:46:40

The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists ...