Libexpat Project

Libexpat

49 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.72%
  • Veröffentlicht 16.06.2016 18:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.

  • EPSS 2.83%
  • Veröffentlicht 26.05.2016 16:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

  • EPSS 0.52%
  • Veröffentlicht 23.07.2015 00:59:12
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspec...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 21.01.2014 18:55:09
  • Zuletzt bearbeitet 29.04.2026 01:13:23

expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests t...

  • EPSS 1.32%
  • Veröffentlicht 03.07.2012 19:55:02
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation...

  • EPSS 1.15%
  • Veröffentlicht 03.07.2012 19:55:02
  • Zuletzt bearbeitet 29.04.2026 01:13:23

readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.

  • EPSS 0.31%
  • Veröffentlicht 03.07.2012 19:55:02
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file wit...

Exploit
  • EPSS 3.01%
  • Veröffentlicht 04.12.2009 21:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that ...

Exploit
  • EPSS 1.57%
  • Veröffentlicht 03.11.2009 16:30:12
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafte...