Xmlsoft

Libxml2

100 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.25%
  • Veröffentlicht 18.11.2015 16:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSect...

  • EPSS 4.34%
  • Veröffentlicht 04.11.2014 16:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing...

Exploit
  • EPSS 2.39%
  • Veröffentlicht 21.01.2014 18:55:09
  • Zuletzt bearbeitet 11.04.2025 00:51:21

libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource cons...

  • EPSS 0.78%
  • Veröffentlicht 10.07.2013 10:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for ...

Exploit
  • EPSS 0.95%
  • Veröffentlicht 25.04.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2...

  • EPSS 0.3%
  • Veröffentlicht 25.04.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entit...

  • EPSS 0.59%
  • Veröffentlicht 21.12.2012 05:46:14
  • Zuletzt bearbeitet 11.04.2025 00:51:21

libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.

  • EPSS 2.07%
  • Veröffentlicht 28.11.2012 01:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute ar...

  • EPSS 1.05%
  • Veröffentlicht 31.08.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have un...

Exploit
  • EPSS 21.39%
  • Veröffentlicht 02.09.2011 16:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file tha...