Libexpat Project

Libexpat

46 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.35%
  • Veröffentlicht 01.01.2022 19:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:28

In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).

Exploit
  • EPSS 0.2%
  • Veröffentlicht 04.09.2019 06:15:10
  • Zuletzt bearbeitet 30.05.2025 20:15:23

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-r...

Exploit
  • EPSS 5.69%
  • Veröffentlicht 24.06.2019 17:15:09
  • Zuletzt bearbeitet 30.05.2025 20:15:20

In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).

  • EPSS 0.02%
  • Veröffentlicht 30.07.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka D...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 25.07.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.

  • EPSS 2.27%
  • Veröffentlicht 30.06.2016 17:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists ...

  • EPSS 2.2%
  • Veröffentlicht 16.06.2016 18:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists beca...

  • EPSS 0.63%
  • Veröffentlicht 16.06.2016 18:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.

  • EPSS 2.83%
  • Veröffentlicht 26.05.2016 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

  • EPSS 0.52%
  • Veröffentlicht 23.07.2015 00:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspec...