Xmlsoft

Libxslt

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 10.07.2025 14:05:41
  • Zuletzt bearbeitet 27.08.2025 18:00:52

A flaw was found in the libxslt library. The same memory field, psvi, is used for both stylesheet and input data, which can lead to type confusion during XML transformations. This vulnerability allows an attacker to crash the application or corrupt m...

Medienbericht
  • EPSS 0.01%
  • Veröffentlicht 14.03.2025 02:15:15
  • Zuletzt bearbeitet 14.03.2025 02:15:15

numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xs...

  • EPSS 0.01%
  • Veröffentlicht 14.03.2025 02:15:15
  • Zuletzt bearbeitet 14.03.2025 02:15:15

xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 03.05.2022 03:15:06
  • Zuletzt bearbeitet 21.11.2024 06:59:45

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte...

  • EPSS 0.09%
  • Veröffentlicht 03.08.2021 19:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:03

Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.11%
  • Veröffentlicht 11.12.2019 01:15:10
  • Zuletzt bearbeitet 21.11.2024 04:45:33

Type confusion in xsltNumberFormatGetMultipleLevel prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data.

  • EPSS 2.85%
  • Veröffentlicht 18.10.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 04:32:48

In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be...

  • EPSS 1.21%
  • Veröffentlicht 01.07.2019 02:15:09
  • Zuletzt bearbeitet 21.11.2024 04:24:13

In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.

  • EPSS 5.13%
  • Veröffentlicht 01.07.2019 02:15:09
  • Zuletzt bearbeitet 21.11.2024 04:24:13

In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or ...

  • EPSS 1.01%
  • Veröffentlicht 10.04.2019 20:29:01
  • Zuletzt bearbeitet 21.11.2024 04:20:28

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is su...