Xmlsoft

Libxml2

101 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.01%
  • Veröffentlicht 18.11.2015 16:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via...

  • EPSS 0.43%
  • Veröffentlicht 18.11.2015 16:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSect...

  • EPSS 3.89%
  • Veröffentlicht 04.11.2014 16:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing...

Exploit
  • EPSS 1.78%
  • Veröffentlicht 21.01.2014 18:55:09
  • Zuletzt bearbeitet 29.04.2026 01:13:23

libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource cons...

  • EPSS 0.63%
  • Veröffentlicht 10.07.2013 10:55:02
  • Zuletzt bearbeitet 29.04.2026 01:13:23

parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for ...

  • EPSS 0.67%
  • Veröffentlicht 25.04.2013 23:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entit...

Exploit
  • EPSS 0.95%
  • Veröffentlicht 25.04.2013 23:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2...

  • EPSS 1.02%
  • Veröffentlicht 21.12.2012 05:46:14
  • Zuletzt bearbeitet 29.04.2026 01:13:23

libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.

  • EPSS 2.07%
  • Veröffentlicht 28.11.2012 01:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute ar...

  • EPSS 0.78%
  • Veröffentlicht 31.08.2012 19:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have un...