Show filters
36 Total Results
Displaying 21-30 of 36
Sort by:
Attacker Value
Unknown
CVE-2021-46143
Disclosure Date: January 06, 2022 (last updated October 07, 2023)
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
0
Attacker Value
Unknown
CVE-2021-45960
Disclosure Date: January 01, 2022 (last updated October 07, 2023)
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
0
Attacker Value
Unknown
CVE-2019-15903
Disclosure Date: September 04, 2019 (last updated November 08, 2023)
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
0
Attacker Value
Unknown
CVE-2018-20843
Disclosure Date: June 24, 2019 (last updated November 08, 2023)
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
0
Attacker Value
Unknown
CVE-2017-11742
Disclosure Date: July 30, 2017 (last updated November 26, 2024)
The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.
0
Attacker Value
Unknown
CVE-2017-9233
Disclosure Date: July 25, 2017 (last updated November 08, 2023)
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
0
Attacker Value
Unknown
CVE-2016-4472
Disclosure Date: June 30, 2016 (last updated November 08, 2023)
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
0
Attacker Value
Unknown
CVE-2012-6702
Disclosure Date: June 16, 2016 (last updated November 08, 2023)
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
0
Attacker Value
Unknown
CVE-2016-5300
Disclosure Date: June 16, 2016 (last updated November 08, 2023)
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
0
Attacker Value
Unknown
CVE-2016-0718
Disclosure Date: May 26, 2016 (last updated November 25, 2024)
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
0