ID CVE-2010-4494
Summary Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
References
Vulnerable Configurations
  • cpe:2.3:a:google:chrome:6.0.472.50
  • cpe:2.3:a:google:chrome:6.0.472.51
  • cpe:2.3:a:google:chrome:6.0.472.48
  • cpe:2.3:a:google:chrome:6.0.472.49
  • cpe:2.3:a:google:chrome:6.0.472.56
  • Google Chrome 6.0.472.57
    cpe:2.3:a:google:chrome:6.0.472.57
  • cpe:2.3:a:google:chrome:6.0.472.52
  • Google Chrome 6.0.472.54
    cpe:2.3:a:google:chrome:6.0.472.54
  • Google Chrome 6.0.472.62
    cpe:2.3:a:google:chrome:6.0.472.62
  • Google Chrome 6.0.472.55
    cpe:2.3:a:google:chrome:6.0.472.55
  • Google Chrome 6.0.472.58
    cpe:2.3:a:google:chrome:6.0.472.58
  • Google Chrome 6.0.472.53
    cpe:2.3:a:google:chrome:6.0.472.53
  • Google Chrome 6.0.459.0
    cpe:2.3:a:google:chrome:6.0.459.0
  • Google Chrome 6.0.460.0
    cpe:2.3:a:google:chrome:6.0.460.0
  • cpe:2.3:a:google:chrome:6.0.458.2
  • cpe:2.3:a:google:chrome:6.0.455.0
  • Google Chrome 6.0.472.59
    cpe:2.3:a:google:chrome:6.0.472.59
  • cpe:2.3:a:google:chrome:6.0.454.0
  • cpe:2.3:a:google:chrome:6.0.472.60
  • Google Chrome 6.0.457.0
    cpe:2.3:a:google:chrome:6.0.457.0
  • Google Chrome 6.0.472.61
    cpe:2.3:a:google:chrome:6.0.472.61
  • Google Chrome 6.0.456.0
    cpe:2.3:a:google:chrome:6.0.456.0
  • Google Chrome 6.0.458.1
    cpe:2.3:a:google:chrome:6.0.458.1
  • Google Chrome 6.0.458.0
    cpe:2.3:a:google:chrome:6.0.458.0
  • Google Chrome 6.0.472.14
    cpe:2.3:a:google:chrome:6.0.472.14
  • cpe:2.3:a:google:chrome:6.0.472.15
  • Google Chrome 6.0.472.12
    cpe:2.3:a:google:chrome:6.0.472.12
  • cpe:2.3:a:google:chrome:6.0.472.13
  • Google Chrome 6.0.472.10
    cpe:2.3:a:google:chrome:6.0.472.10
  • Google Chrome 6.0.472.11
    cpe:2.3:a:google:chrome:6.0.472.11
  • Google Chrome 6.0.472.8
    cpe:2.3:a:google:chrome:6.0.472.8
  • Google Chrome 6.0.472.9
    cpe:2.3:a:google:chrome:6.0.472.9
  • Google Chrome 6.0.472.6
    cpe:2.3:a:google:chrome:6.0.472.6
  • cpe:2.3:a:google:chrome:6.0.472.7
  • cpe:2.3:a:google:chrome:6.0.472.4
  • cpe:2.3:a:google:chrome:6.0.472.5
  • Google Chrome 6.0.472.2
    cpe:2.3:a:google:chrome:6.0.472.2
  • cpe:2.3:a:google:chrome:6.0.472.3
  • Google Chrome 6.0.472.0
    cpe:2.3:a:google:chrome:6.0.472.0
  • Google Chrome 6.0.472.1
    cpe:2.3:a:google:chrome:6.0.472.1
  • cpe:2.3:a:google:chrome:6.0.471.0
  • Google Chrome 6.0.470.0
    cpe:2.3:a:google:chrome:6.0.470.0
  • cpe:2.3:a:google:chrome:6.0.469.0
  • Google Chrome 6.0.467.0
    cpe:2.3:a:google:chrome:6.0.467.0
  • Google Chrome 6.0.466.6
    cpe:2.3:a:google:chrome:6.0.466.6
  • Google Chrome 6.0.466.5
    cpe:2.3:a:google:chrome:6.0.466.5
  • Google Chrome 6.0.466.4
    cpe:2.3:a:google:chrome:6.0.466.4
  • Google Chrome 6.0.466.3
    cpe:2.3:a:google:chrome:6.0.466.3
  • cpe:2.3:a:google:chrome:6.0.466.2
  • cpe:2.3:a:google:chrome:6.0.466.1
  • Google Chrome 6.0.466.0
    cpe:2.3:a:google:chrome:6.0.466.0
  • cpe:2.3:a:google:chrome:6.0.465.2
  • cpe:2.3:a:google:chrome:6.0.465.1
  • Google Chrome 6.0.464.1
    cpe:2.3:a:google:chrome:6.0.464.1
  • Google Chrome 6.0.462.0
    cpe:2.3:a:google:chrome:6.0.462.0
  • Google Chrome 6.0.461.0
    cpe:2.3:a:google:chrome:6.0.461.0
  • Google Chrome 6.0.472.44
    cpe:2.3:a:google:chrome:6.0.472.44
  • Google Chrome 6.0.472.45
    cpe:2.3:a:google:chrome:6.0.472.45
  • Google Chrome 6.0.472.46
    cpe:2.3:a:google:chrome:6.0.472.46
  • Google Chrome 6.0.472.47
    cpe:2.3:a:google:chrome:6.0.472.47
  • cpe:2.3:a:google:chrome:6.0.472.40
  • cpe:2.3:a:google:chrome:6.0.472.41
  • Google Chrome 6.0.472.42
    cpe:2.3:a:google:chrome:6.0.472.42
  • Google Chrome 6.0.472.43
    cpe:2.3:a:google:chrome:6.0.472.43
  • Google Chrome 6.0.472.36
    cpe:2.3:a:google:chrome:6.0.472.36
  • cpe:2.3:a:google:chrome:6.0.472.37
  • Google Chrome 6.0.472.38
    cpe:2.3:a:google:chrome:6.0.472.38
  • cpe:2.3:a:google:chrome:6.0.472.39
  • cpe:2.3:a:google:chrome:6.0.472.32
  • Google Chrome 6.0.472.33
    cpe:2.3:a:google:chrome:6.0.472.33
  • Google Chrome 6.0.472.34
    cpe:2.3:a:google:chrome:6.0.472.34
  • Google Chrome 6.0.472.35
    cpe:2.3:a:google:chrome:6.0.472.35
  • cpe:2.3:a:google:chrome:6.0.472.29
  • Google Chrome 6.0.472.28
    cpe:2.3:a:google:chrome:6.0.472.28
  • cpe:2.3:a:google:chrome:6.0.472.31
  • Google Chrome 6.0.472.30
    cpe:2.3:a:google:chrome:6.0.472.30
  • Google Chrome 6.0.472.25
    cpe:2.3:a:google:chrome:6.0.472.25
  • Google Chrome 6.0.472.24
    cpe:2.3:a:google:chrome:6.0.472.24
  • cpe:2.3:a:google:chrome:6.0.472.27
  • Google Chrome 6.0.472.26
    cpe:2.3:a:google:chrome:6.0.472.26
  • cpe:2.3:a:google:chrome:6.0.472.21
  • cpe:2.3:a:google:chrome:6.0.472.20
  • Google Chrome 6.0.472.23
    cpe:2.3:a:google:chrome:6.0.472.23
  • cpe:2.3:a:google:chrome:6.0.472.22
  • cpe:2.3:a:google:chrome:6.0.472.17
  • Google Chrome 6.0.472.16
    cpe:2.3:a:google:chrome:6.0.472.16
  • Google Chrome 6.0.472.19
    cpe:2.3:a:google:chrome:6.0.472.19
  • Google Chrome 6.0.472.18
    cpe:2.3:a:google:chrome:6.0.472.18
  • Google Chrome 6.0.472.63
    cpe:2.3:a:google:chrome:6.0.472.63
  • cpe:2.3:a:google:chrome:6.0.473.0
  • Google Chrome 6.0.474.0
    cpe:2.3:a:google:chrome:6.0.474.0
  • Google Chrome 6.0.475.0
    cpe:2.3:a:google:chrome:6.0.475.0
  • cpe:2.3:a:google:chrome:6.0.476.0
  • Google Chrome 6.0.477.0
    cpe:2.3:a:google:chrome:6.0.477.0
  • cpe:2.3:a:google:chrome:6.0.478.0
  • cpe:2.3:a:google:chrome:6.0.479.0
  • Google Chrome 6.0.480.0
    cpe:2.3:a:google:chrome:6.0.480.0
  • Google Chrome 6.0.481.0
    cpe:2.3:a:google:chrome:6.0.481.0
  • Google Chrome 6.0.482.0
    cpe:2.3:a:google:chrome:6.0.482.0
  • cpe:2.3:a:google:chrome:6.0.483.0
  • cpe:2.3:a:google:chrome:6.0.484.0
  • cpe:2.3:a:google:chrome:6.0.485.0
  • cpe:2.3:a:google:chrome:6.0.486.0
  • cpe:2.3:a:google:chrome:6.0.487.0
  • cpe:2.3:a:google:chrome:6.0.488.0
  • cpe:2.3:a:google:chrome:6.0.489.0
  • Google Chrome 6.0.490.0
    cpe:2.3:a:google:chrome:6.0.490.0
  • Google Chrome 6.0.490.1
    cpe:2.3:a:google:chrome:6.0.490.1
  • cpe:2.3:a:google:chrome:6.0.491.0
  • Google Chrome 6.0.492.0
    cpe:2.3:a:google:chrome:6.0.492.0
  • Google Chrome 6.0.493.0
    cpe:2.3:a:google:chrome:6.0.493.0
  • cpe:2.3:a:google:chrome:6.0.494.0
  • cpe:2.3:a:google:chrome:6.0.495.0
  • cpe:2.3:a:google:chrome:6.0.495.1
  • Google Chrome 6.0.496.0
    cpe:2.3:a:google:chrome:6.0.496.0
  • cpe:2.3:a:google:chrome:7.0.497.0
  • cpe:2.3:a:google:chrome:7.0.498.0
  • Google Chrome 7.0.499.0
    cpe:2.3:a:google:chrome:7.0.499.0
  • Google Chrome 7.0.499.1
    cpe:2.3:a:google:chrome:7.0.499.1
  • cpe:2.3:a:google:chrome:7.0.500.0
  • Google Chrome 7.0.500.1
    cpe:2.3:a:google:chrome:7.0.500.1
  • Google Chrome 7.0.503.0
    cpe:2.3:a:google:chrome:7.0.503.0
  • cpe:2.3:a:google:chrome:7.0.503.1
  • cpe:2.3:a:google:chrome:7.0.504.0
  • cpe:2.3:a:google:chrome:7.0.505.0
  • Google Chrome 7.0.506.0
    cpe:2.3:a:google:chrome:7.0.506.0
  • cpe:2.3:a:google:chrome:7.0.507.0
  • cpe:2.3:a:google:chrome:7.0.507.1
  • Google Chrome 7.0.507.2
    cpe:2.3:a:google:chrome:7.0.507.2
  • Google Chrome 7.0.507.3
    cpe:2.3:a:google:chrome:7.0.507.3
  • cpe:2.3:a:google:chrome:7.0.509.0
  • Google Chrome 7.0.510.0
    cpe:2.3:a:google:chrome:7.0.510.0
  • Google Chrome 7.0.511.1
    cpe:2.3:a:google:chrome:7.0.511.1
  • Google Chrome 7.0.511.2
    cpe:2.3:a:google:chrome:7.0.511.2
  • Google Chrome 7.0.511.4
    cpe:2.3:a:google:chrome:7.0.511.4
  • Google Chrome 7.0.512.0
    cpe:2.3:a:google:chrome:7.0.512.0
  • cpe:2.3:a:google:chrome:7.0.513.0
  • Google Chrome 7.0.514.0
    cpe:2.3:a:google:chrome:7.0.514.0
  • cpe:2.3:a:google:chrome:7.0.514.1
  • Google Chrome 7.0.515.0
    cpe:2.3:a:google:chrome:7.0.515.0
  • cpe:2.3:a:google:chrome:7.0.516.0
  • Google Chrome 7.0.517.0
    cpe:2.3:a:google:chrome:7.0.517.0
  • Google Chrome 7.0.517.10
    cpe:2.3:a:google:chrome:7.0.517.10
  • Google Chrome 7.0.517.11
    cpe:2.3:a:google:chrome:7.0.517.11
  • Google Chrome 7.0.517.12
    cpe:2.3:a:google:chrome:7.0.517.12
  • cpe:2.3:a:google:chrome:7.0.517.13
  • cpe:2.3:a:google:chrome:7.0.517.14
  • cpe:2.3:a:google:chrome:7.0.517.16
  • cpe:2.3:a:google:chrome:7.0.517.17
  • Google Chrome 7.0.517.18
    cpe:2.3:a:google:chrome:7.0.517.18
  • cpe:2.3:a:google:chrome:7.0.517.19
  • Google Chrome 7.0.517.2
    cpe:2.3:a:google:chrome:7.0.517.2
  • Google Chrome 7.0.517.20
    cpe:2.3:a:google:chrome:7.0.517.20
  • Google Chrome 7.0.517.21
    cpe:2.3:a:google:chrome:7.0.517.21
  • cpe:2.3:a:google:chrome:7.0.517.22
  • Google Chrome 7.0.517.23
    cpe:2.3:a:google:chrome:7.0.517.23
  • cpe:2.3:a:google:chrome:7.0.517.24
  • cpe:2.3:a:google:chrome:7.0.517.25
  • Google Chrome 7.0.517.26
    cpe:2.3:a:google:chrome:7.0.517.26
  • Google Chrome 7.0.517.27
    cpe:2.3:a:google:chrome:7.0.517.27
  • Google Chrome 7.0.517.28
    cpe:2.3:a:google:chrome:7.0.517.28
  • Google Chrome 7.0.517.29
    cpe:2.3:a:google:chrome:7.0.517.29
  • cpe:2.3:a:google:chrome:7.0.517.30
  • Google Chrome 7.0.517.31
    cpe:2.3:a:google:chrome:7.0.517.31
  • cpe:2.3:a:google:chrome:7.0.517.32
  • cpe:2.3:a:google:chrome:7.0.517.33
  • Google Chrome 7.0.517.34
    cpe:2.3:a:google:chrome:7.0.517.34
  • Google Chrome 7.0.517.35
    cpe:2.3:a:google:chrome:7.0.517.35
  • Google Chrome 7.0.517.36
    cpe:2.3:a:google:chrome:7.0.517.36
  • Google Chrome 7.0.517.37
    cpe:2.3:a:google:chrome:7.0.517.37
  • cpe:2.3:a:google:chrome:7.0.517.38
  • Google Chrome 7.0.517.39
    cpe:2.3:a:google:chrome:7.0.517.39
  • Google Chrome 7.0.517.4
    cpe:2.3:a:google:chrome:7.0.517.4
  • cpe:2.3:a:google:chrome:7.0.517.5
  • cpe:2.3:a:google:chrome:7.0.517.6
  • cpe:2.3:a:google:chrome:7.0.517.7
  • cpe:2.3:a:google:chrome:7.0.517.8
  • Google Chrome 7.0.517.9
    cpe:2.3:a:google:chrome:7.0.517.9
  • cpe:2.3:a:google:chrome:0.1.42.2
  • Google Chrome 0.1.42.3
    cpe:2.3:a:google:chrome:0.1.42.3
  • Google Chrome 3.0.195.24
    cpe:2.3:a:google:chrome:3.0.195.24
  • cpe:2.3:a:google:chrome:2.0.172.28
  • Google Chrome 3.0.193.2:beta
    cpe:2.3:a:google:chrome:3.0.193.2:beta
  • Google Chrome 1.0.154.36
    cpe:2.3:a:google:chrome:1.0.154.36
  • cpe:2.3:a:google:chrome:4.0.244.0
  • cpe:2.3:a:google:chrome:3.0.195.33
  • cpe:2.3:a:google:chrome:3.0.195.32
  • Google Chrome 0.1.38.1
    cpe:2.3:a:google:chrome:0.1.38.1
  • Google Chrome 0.1.38.2
    cpe:2.3:a:google:chrome:0.1.38.2
  • Google Chrome 0.1.38.4
    cpe:2.3:a:google:chrome:0.1.38.4
  • Google Chrome 0.1.40.1
    cpe:2.3:a:google:chrome:0.1.40.1
  • cpe:2.3:a:google:chrome:4.0.249.0
  • cpe:2.3:a:google:chrome:1.0.154.48
  • cpe:2.3:a:google:chrome:2.0.172.38
  • cpe:2.3:a:google:chrome:2.0.172.8
  • cpe:2.3:a:google:chrome:2.0.172.2
  • cpe:2.3:a:google:chrome:2.0.172.27
  • cpe:2.3:a:google:chrome:3.0.195.21
  • cpe:2.3:a:google:chrome:3.0.182.2
  • Google Chrome 3.0.190.2
    cpe:2.3:a:google:chrome:3.0.190.2
  • Google Chrome 2.0.172
    cpe:2.3:a:google:chrome:2.0.172
  • Google Chrome 1.0.154.64
    cpe:2.3:a:google:chrome:1.0.154.64
  • Google Chrome 1.0.154.43
    cpe:2.3:a:google:chrome:1.0.154.43
  • Google Chrome 4.0.243.0
    cpe:2.3:a:google:chrome:4.0.243.0
  • Google Chrome 4.0.242.0
    cpe:2.3:a:google:chrome:4.0.242.0
  • cpe:2.3:a:google:chrome:4.0.241.0
  • cpe:2.3:a:google:chrome:4.0.240.0
  • Google Chrome 4.0.239.0
    cpe:2.3:a:google:chrome:4.0.239.0
  • Google Chrome 4.0.237.0
    cpe:2.3:a:google:chrome:4.0.237.0
  • Google Chrome 4.0.237.1
    cpe:2.3:a:google:chrome:4.0.237.1
  • cpe:2.3:a:google:chrome:4.0.236.0
  • cpe:2.3:a:google:chrome:4.0.235.0
  • Google Chrome 4.0.229.1
    cpe:2.3:a:google:chrome:4.0.229.1
  • cpe:2.3:a:google:chrome:4.0.224.0
  • Google Chrome 4.0.223.9
    cpe:2.3:a:google:chrome:4.0.223.9
  • Google Chrome 4.0.223.8
    cpe:2.3:a:google:chrome:4.0.223.8
  • Google Chrome 4.0.223.7
    cpe:2.3:a:google:chrome:4.0.223.7
  • Google Chrome 4.0.223.5
    cpe:2.3:a:google:chrome:4.0.223.5
  • Google Chrome 4.0.223.4
    cpe:2.3:a:google:chrome:4.0.223.4
  • Google Chrome 4.0.223.1
    cpe:2.3:a:google:chrome:4.0.223.1
  • cpe:2.3:a:google:chrome:4.0.223.2
  • cpe:2.3:a:google:chrome:4.0.222.0
  • Google Chrome 4.0.223.0
    cpe:2.3:a:google:chrome:4.0.223.0
  • cpe:2.3:a:google:chrome:4.0.222.12
  • cpe:2.3:a:google:chrome:4.0.222.5
  • cpe:2.3:a:google:chrome:4.0.221.8
  • Google Chrome 4.0.222.1
    cpe:2.3:a:google:chrome:4.0.222.1
  • cpe:2.3:a:google:chrome:4.0.212.0
  • Google Chrome 4.0.212.1
    cpe:2.3:a:google:chrome:4.0.212.1
  • cpe:2.3:a:google:chrome:3.0.195.37
  • Google Chrome 3.0.195.38
    cpe:2.3:a:google:chrome:3.0.195.38
  • Google Chrome 3.0.195.27
    cpe:2.3:a:google:chrome:3.0.195.27
  • Google Chrome 3.0.195.36
    cpe:2.3:a:google:chrome:3.0.195.36
  • Google Chrome 3.0.195.2
    cpe:2.3:a:google:chrome:3.0.195.2
  • cpe:2.3:a:google:chrome:3.0.195.25
  • Google Chrome 1.0.154.59
    cpe:2.3:a:google:chrome:1.0.154.59
  • Google Chrome 4.0.245.1
    cpe:2.3:a:google:chrome:4.0.245.1
  • Google Chrome 4.0.245.0
    cpe:2.3:a:google:chrome:4.0.245.0
  • cpe:2.3:a:google:chrome:4.0.247.0
  • Google Chrome 4.0.246.0
    cpe:2.3:a:google:chrome:4.0.246.0
  • Google Chrome 4.0.249.1
    cpe:2.3:a:google:chrome:4.0.249.1
  • Google Chrome 4.0.248.0
    cpe:2.3:a:google:chrome:4.0.248.0
  • Google Chrome 4.0.249.11
    cpe:2.3:a:google:chrome:4.0.249.11
  • cpe:2.3:a:google:chrome:1.0.154.53
  • Google Chrome 4.0.249.10
    cpe:2.3:a:google:chrome:4.0.249.10
  • Google Chrome 4.0.249.14
    cpe:2.3:a:google:chrome:4.0.249.14
  • cpe:2.3:a:google:chrome:4.0.249.12
  • Google Chrome 4.0.249.17
    cpe:2.3:a:google:chrome:4.0.249.17
  • cpe:2.3:a:google:chrome:4.0.249.16
  • Google Chrome 4.0.249.18
    cpe:2.3:a:google:chrome:4.0.249.18
  • cpe:2.3:a:google:chrome:2.0.157.0
  • Google Chrome 2.0.157.2
    cpe:2.3:a:google:chrome:2.0.157.2
  • Google Chrome 2.0.156.1
    cpe:2.3:a:google:chrome:2.0.156.1
  • Google Chrome 2.0.172.31
    cpe:2.3:a:google:chrome:2.0.172.31
  • Google Chrome 0.3.154.3
    cpe:2.3:a:google:chrome:0.3.154.3
  • cpe:2.3:a:google:chrome:2.0.172.30
  • Google Chrome 0.4.154.18
    cpe:2.3:a:google:chrome:0.4.154.18
  • cpe:2.3:a:google:chrome:0.2.153.1
  • cpe:2.3:a:google:chrome:2.0.172.33
  • Google Chrome 0.3.154.0
    cpe:2.3:a:google:chrome:0.3.154.0
  • cpe:2.3:a:google:chrome:2.0.169.1
  • cpe:2.3:a:google:chrome:1.0.154.46
  • Google Chrome 2.0.170.0
    cpe:2.3:a:google:chrome:2.0.170.0
  • cpe:2.3:a:google:chrome:0.2.152.1
  • cpe:2.3:a:google:chrome:2.0.158.0
  • Google Chrome 2.0.169.0
    cpe:2.3:a:google:chrome:2.0.169.0
  • Google Chrome 2.0.159.0
    cpe:2.3:a:google:chrome:2.0.159.0
  • Google Chrome 0.4.154.31
    cpe:2.3:a:google:chrome:0.4.154.31
  • cpe:2.3:a:google:chrome:0.4.154.22
  • Google Chrome 1.0.154.39
    cpe:2.3:a:google:chrome:1.0.154.39
  • cpe:2.3:a:google:chrome:0.4.154.33
  • Google Chrome 0.2.149.27
    cpe:2.3:a:google:chrome:0.2.149.27
  • Google Chrome 1.0.154.42
    cpe:2.3:a:google:chrome:1.0.154.42
  • cpe:2.3:a:google:chrome:1.0.154.65
  • cpe:2.3:a:google:chrome:2.0.172.37
  • Google Chrome 0.2.149.29
    cpe:2.3:a:google:chrome:0.2.149.29
  • Google Chrome 0.2.149.30
    cpe:2.3:a:google:chrome:0.2.149.30
  • cpe:2.3:a:google:chrome:1.0.154.52
  • Google Chrome 4.0.249.60
    cpe:2.3:a:google:chrome:4.0.249.60
  • cpe:2.3:a:google:chrome:4.0.249.78
  • cpe:2.3:a:google:chrome:4.0.249.78:beta
  • cpe:2.3:a:google:chrome:4.0.249.89
  • Google Chrome 4.0.249.21
    cpe:2.3:a:google:chrome:4.0.249.21
  • Google Chrome 4.0.249.22
    cpe:2.3:a:google:chrome:4.0.249.22
  • Google Chrome 4.0.249.23
    cpe:2.3:a:google:chrome:4.0.249.23
  • Google Chrome 4.0.249.24
    cpe:2.3:a:google:chrome:4.0.249.24
  • cpe:2.3:a:google:chrome:4.0.249.25
  • cpe:2.3:a:google:chrome:4.0.249.26
  • cpe:2.3:a:google:chrome:4.0.249.27
  • cpe:2.3:a:google:chrome:4.0.249.28
  • Google Chrome 4.0.249.29
    cpe:2.3:a:google:chrome:4.0.249.29
  • Google Chrome 4.0.249.30
    cpe:2.3:a:google:chrome:4.0.249.30
  • Google Chrome 4.0.249.31
    cpe:2.3:a:google:chrome:4.0.249.31
  • Google Chrome 4.0.249.32
    cpe:2.3:a:google:chrome:4.0.249.32
  • cpe:2.3:a:google:chrome:4.0.249.33
  • Google Chrome 4.0.249.34
    cpe:2.3:a:google:chrome:4.0.249.34
  • Google Chrome 4.0.249.35
    cpe:2.3:a:google:chrome:4.0.249.35
  • Google Chrome 4.0.249.36
    cpe:2.3:a:google:chrome:4.0.249.36
  • cpe:2.3:a:google:chrome:4.0.249.19
  • cpe:2.3:a:google:chrome:4.0.249.20
  • cpe:2.3:a:google:chrome:4.0.249.2
  • cpe:2.3:a:google:chrome:4.0.249.52
  • Google Chrome 4.0.249.53
    cpe:2.3:a:google:chrome:4.0.249.53
  • cpe:2.3:a:google:chrome:4.0.249.50
  • cpe:2.3:a:google:chrome:4.0.249.51
  • cpe:2.3:a:google:chrome:4.0.249.56
  • cpe:2.3:a:google:chrome:4.0.249.57
  • Google Chrome 4.0.249.54
    cpe:2.3:a:google:chrome:4.0.249.54
  • cpe:2.3:a:google:chrome:4.0.249.55
  • Google Chrome 4.0.249.6
    cpe:2.3:a:google:chrome:4.0.249.6
  • cpe:2.3:a:google:chrome:4.0.249.61
  • Google Chrome 4.0.249.58
    cpe:2.3:a:google:chrome:4.0.249.58
  • cpe:2.3:a:google:chrome:4.0.249.59
  • cpe:2.3:a:google:chrome:4.0.249.64
  • cpe:2.3:a:google:chrome:4.0.249.65
  • Google Chrome 4.0.249.62
    cpe:2.3:a:google:chrome:4.0.249.62
  • Google Chrome 4.0.249.63
    cpe:2.3:a:google:chrome:4.0.249.63
  • cpe:2.3:a:google:chrome:4.0.249.3
  • Google Chrome 4.0.249.39
    cpe:2.3:a:google:chrome:4.0.249.39
  • cpe:2.3:a:google:chrome:4.0.249.38
  • Google Chrome 4.0.249.37
    cpe:2.3:a:google:chrome:4.0.249.37
  • Google Chrome 4.0.249.42
    cpe:2.3:a:google:chrome:4.0.249.42
  • cpe:2.3:a:google:chrome:4.0.249.41
  • cpe:2.3:a:google:chrome:4.0.249.40
  • Google Chrome 4.0.249.4
    cpe:2.3:a:google:chrome:4.0.249.4
  • Google Chrome 4.0.249.46
    cpe:2.3:a:google:chrome:4.0.249.46
  • Google Chrome 4.0.249.45
    cpe:2.3:a:google:chrome:4.0.249.45
  • Google Chrome 4.0.249.44
    cpe:2.3:a:google:chrome:4.0.249.44
  • cpe:2.3:a:google:chrome:4.0.249.43
  • Google Chrome 4.0.249.5
    cpe:2.3:a:google:chrome:4.0.249.5
  • cpe:2.3:a:google:chrome:4.0.249.49
  • cpe:2.3:a:google:chrome:4.0.249.48
  • cpe:2.3:a:google:chrome:4.0.249.47
  • cpe:2.3:a:google:chrome:4.0.250.2
  • cpe:2.3:a:google:chrome:4.0.251.0
  • Google Chrome 4.0.252.0
    cpe:2.3:a:google:chrome:4.0.252.0
  • cpe:2.3:a:google:chrome:4.0.254.0
  • Google Chrome 4.0.249.80
    cpe:2.3:a:google:chrome:4.0.249.80
  • Google Chrome 4.0.249.81
    cpe:2.3:a:google:chrome:4.0.249.81
  • cpe:2.3:a:google:chrome:4.0.249.82
  • Google Chrome 4.0.250.0
    cpe:2.3:a:google:chrome:4.0.250.0
  • Google Chrome 4.0.259.0
    cpe:2.3:a:google:chrome:4.0.259.0
  • cpe:2.3:a:google:chrome:4.0.260.0
  • cpe:2.3:a:google:chrome:4.0.261.0
  • Google Chrome 4.0.262.0
    cpe:2.3:a:google:chrome:4.0.262.0
  • Google Chrome 4.0.255.0
    cpe:2.3:a:google:chrome:4.0.255.0
  • cpe:2.3:a:google:chrome:4.0.256.0
  • Google Chrome 4.0.257.0
    cpe:2.3:a:google:chrome:4.0.257.0
  • Google Chrome 4.0.258.0
    cpe:2.3:a:google:chrome:4.0.258.0
  • Google Chrome 4.0.249.70
    cpe:2.3:a:google:chrome:4.0.249.70
  • Google Chrome 4.0.249.7
    cpe:2.3:a:google:chrome:4.0.249.7
  • cpe:2.3:a:google:chrome:4.0.249.72
  • Google Chrome 4.0.249.71
    cpe:2.3:a:google:chrome:4.0.249.71
  • Google Chrome 4.0.249.67
    cpe:2.3:a:google:chrome:4.0.249.67
  • Google Chrome 4.0.249.66
    cpe:2.3:a:google:chrome:4.0.249.66
  • cpe:2.3:a:google:chrome:4.0.249.69
  • Google Chrome 4.0.249.68
    cpe:2.3:a:google:chrome:4.0.249.68
  • cpe:2.3:a:google:chrome:4.0.249.79
  • cpe:2.3:a:google:chrome:4.0.249.77
  • cpe:2.3:a:google:chrome:4.0.249.8
  • Google Chrome 4.0.249.9
    cpe:2.3:a:google:chrome:4.0.249.9
  • Google Chrome 4.0.249.74
    cpe:2.3:a:google:chrome:4.0.249.74
  • Google Chrome 4.0.249.73
    cpe:2.3:a:google:chrome:4.0.249.73
  • cpe:2.3:a:google:chrome:4.0.249.76
  • cpe:2.3:a:google:chrome:4.0.249.75
  • cpe:2.3:a:google:chrome:4.0.271.0
  • Google Chrome 4.0.269.0
    cpe:2.3:a:google:chrome:4.0.269.0
  • cpe:2.3:a:google:chrome:4.0.268.0
  • Google Chrome 4.0.267.0
    cpe:2.3:a:google:chrome:4.0.267.0
  • Google Chrome 4.0.266.0
    cpe:2.3:a:google:chrome:4.0.266.0
  • Google Chrome 4.0.265.0
    cpe:2.3:a:google:chrome:4.0.265.0
  • cpe:2.3:a:google:chrome:4.0.264.0
  • Google Chrome 4.0.263.0
    cpe:2.3:a:google:chrome:4.0.263.0
  • cpe:2.3:a:google:chrome:4.0.277.0
  • Google Chrome 4.0.276.0
    cpe:2.3:a:google:chrome:4.0.276.0
  • cpe:2.3:a:google:chrome:4.0.275.1
  • Google Chrome 4.0.275.0
    cpe:2.3:a:google:chrome:4.0.275.0
  • Google Chrome 4.0.272.0
    cpe:2.3:a:google:chrome:4.0.272.0
  • Google Chrome 5.0.307.5
    cpe:2.3:a:google:chrome:5.0.307.5
  • cpe:2.3:a:google:chrome:4.1.249.1056
  • Google Chrome 5.0.307.4
    cpe:2.3:a:google:chrome:5.0.307.4
  • Google Chrome 4.1.249.1055
    cpe:2.3:a:google:chrome:4.1.249.1055
  • cpe:2.3:a:google:chrome:5.0.307.7
  • cpe:2.3:a:google:chrome:4.1.249.1058
  • Google Chrome 5.0.307.6
    cpe:2.3:a:google:chrome:5.0.307.6
  • Google Chrome 4.1.249.1057
    cpe:2.3:a:google:chrome:4.1.249.1057
  • Google Chrome 5.0.307.9
    cpe:2.3:a:google:chrome:5.0.307.9
  • Google Chrome 4.1.249.1052
    cpe:2.3:a:google:chrome:4.1.249.1052
  • Google Chrome 5.0.307.8
    cpe:2.3:a:google:chrome:5.0.307.8
  • Google Chrome 4.1.249.1051
    cpe:2.3:a:google:chrome:4.1.249.1051
  • Google Chrome 5.0.309.0
    cpe:2.3:a:google:chrome:5.0.309.0
  • Google Chrome 4.1.249.1054
    cpe:2.3:a:google:chrome:4.1.249.1054
  • Google Chrome 5.0.308.0
    cpe:2.3:a:google:chrome:5.0.308.0
  • Google Chrome 4.1.249.1053
    cpe:2.3:a:google:chrome:4.1.249.1053
  • cpe:2.3:a:google:chrome:4.1.249.1064
  • cpe:2.3:a:google:chrome:4.1.249.1044
  • Google Chrome 4.1.249.1063
    cpe:2.3:a:google:chrome:4.1.249.1063
  • cpe:2.3:a:google:chrome:4.1.249.1043
  • cpe:2.3:a:google:chrome:5.0.306.1
  • Google Chrome 4.0.304.0
    cpe:2.3:a:google:chrome:4.0.304.0
  • Google Chrome 5.0.306.0
    cpe:2.3:a:google:chrome:5.0.306.0
  • cpe:2.3:a:google:chrome:4.0.305.0
  • cpe:2.3:a:google:chrome:5.0.307.10
  • Google Chrome 4.1.249.1060
    cpe:2.3:a:google:chrome:4.1.249.1060
  • cpe:2.3:a:google:chrome:5.0.307.1
  • Google Chrome 4.1.249.1059
    cpe:2.3:a:google:chrome:4.1.249.1059
  • cpe:2.3:a:google:chrome:5.0.307.3
  • Google Chrome 4.1.249.1062
    cpe:2.3:a:google:chrome:4.1.249.1062
  • Google Chrome 5.0.307.11
    cpe:2.3:a:google:chrome:5.0.307.11
  • Google Chrome 4.1.249.1061
    cpe:2.3:a:google:chrome:4.1.249.1061
  • Google Chrome 4.1.249.1037
    cpe:2.3:a:google:chrome:4.1.249.1037
  • Google Chrome 4.1.249.1038
    cpe:2.3:a:google:chrome:4.1.249.1038
  • Google Chrome 4.1.249.1039
    cpe:2.3:a:google:chrome:4.1.249.1039
  • Google Chrome 4.1.249.1040
    cpe:2.3:a:google:chrome:4.1.249.1040
  • cpe:2.3:a:google:chrome:4.1.249.1041
  • cpe:2.3:a:google:chrome:4.1.249.1047
  • cpe:2.3:a:google:chrome:4.1.249.1048
  • cpe:2.3:a:google:chrome:4.1.249.1049
  • Google Chrome 4.1.249.1050
    cpe:2.3:a:google:chrome:4.1.249.1050
  • cpe:2.3:a:google:chrome:4.1.249.1046
  • cpe:2.3:a:google:chrome:4.1.249.1033
  • Google Chrome 4.1.249.1034
    cpe:2.3:a:google:chrome:4.1.249.1034
  • cpe:2.3:a:google:chrome:4.1.249.1031
  • Google Chrome 4.1.249.1032
    cpe:2.3:a:google:chrome:4.1.249.1032
  • cpe:2.3:a:google:chrome:4.1.249.1042
  • Google Chrome 4.1.249.1035
    cpe:2.3:a:google:chrome:4.1.249.1035
  • cpe:2.3:a:google:chrome:4.1:beta
  • cpe:2.3:a:google:chrome:4.1.249.1045
  • Google Chrome 4.1.249.1036
    cpe:2.3:a:google:chrome:4.1.249.1036
  • cpe:2.3:a:google:chrome:5.0.313.0
  • Google Chrome 5.0.314.0
    cpe:2.3:a:google:chrome:5.0.314.0
  • Google Chrome 4.1.249.1012
    cpe:2.3:a:google:chrome:4.1.249.1012
  • Google Chrome 4.1.249.1011
    cpe:2.3:a:google:chrome:4.1.249.1011
  • cpe:2.3:a:google:chrome:4.1.249.1014
  • Google Chrome 4.1.249.1013
    cpe:2.3:a:google:chrome:4.1.249.1013
  • Google Chrome 4.1.249.1008
    cpe:2.3:a:google:chrome:4.1.249.1008
  • cpe:2.3:a:google:chrome:4.1.249.1007
  • cpe:2.3:a:google:chrome:4.1.249.1010
  • cpe:2.3:a:google:chrome:4.1.249.1009
  • Google Chrome 4.1.249.1001
    cpe:2.3:a:google:chrome:4.1.249.1001
  • cpe:2.3:a:google:chrome:4.1.249.0
  • cpe:2.3:a:google:chrome:4.1.249.1006
  • Google Chrome 4.1.249.1004
    cpe:2.3:a:google:chrome:4.1.249.1004
  • Google Chrome 4.1.249.1027
    cpe:2.3:a:google:chrome:4.1.249.1027
  • Google Chrome 4.1.249.1028
    cpe:2.3:a:google:chrome:4.1.249.1028
  • Google Chrome 4.1.249.1029
    cpe:2.3:a:google:chrome:4.1.249.1029
  • cpe:2.3:a:google:chrome:4.1.249.1030
  • Google Chrome 4.1.249.1023
    cpe:2.3:a:google:chrome:4.1.249.1023
  • cpe:2.3:a:google:chrome:4.1.249.1024
  • Google Chrome 4.1.249.1025
    cpe:2.3:a:google:chrome:4.1.249.1025
  • Google Chrome 4.1.249.1026
    cpe:2.3:a:google:chrome:4.1.249.1026
  • cpe:2.3:a:google:chrome:4.1.249.1019
  • cpe:2.3:a:google:chrome:4.1.249.1020
  • cpe:2.3:a:google:chrome:4.1.249.1021
  • cpe:2.3:a:google:chrome:4.1.249.1022
  • cpe:2.3:a:google:chrome:4.1.249.1015
  • cpe:2.3:a:google:chrome:4.1.249.1016
  • Google Chrome 4.1.249.1017
    cpe:2.3:a:google:chrome:4.1.249.1017
  • Google Chrome 4.1.249.1018
    cpe:2.3:a:google:chrome:4.1.249.1018
  • cpe:2.3:a:google:chrome:4.0.295.0
  • cpe:2.3:a:google:chrome:4.0.296.0
  • cpe:2.3:a:google:chrome:4.0.292.0
  • Google Chrome 4.0.294.0
    cpe:2.3:a:google:chrome:4.0.294.0
  • cpe:2.3:a:google:chrome:4.0.289.0
  • cpe:2.3:a:google:chrome:4.0.290.0
  • cpe:2.3:a:google:chrome:4.0.288.0
  • Google Chrome 4.0.288.1
    cpe:2.3:a:google:chrome:4.0.288.1
  • Google Chrome 4.0.302.3
    cpe:2.3:a:google:chrome:4.0.302.3
  • Google Chrome 4.0.303.0
    cpe:2.3:a:google:chrome:4.0.303.0
  • Google Chrome 4.0.302.1
    cpe:2.3:a:google:chrome:4.0.302.1
  • cpe:2.3:a:google:chrome:4.0.302.2
  • cpe:2.3:a:google:chrome:4.0.301.0
  • cpe:2.3:a:google:chrome:4.0.302.0
  • cpe:2.3:a:google:chrome:4.0.299.0
  • cpe:2.3:a:google:chrome:4.0.300.0
  • Google Chrome 4.0.287.0
    cpe:2.3:a:google:chrome:4.0.287.0
  • Google Chrome 4.0.286.0
    cpe:2.3:a:google:chrome:4.0.286.0
  • Google Chrome 4.0.278.0
    cpe:2.3:a:google:chrome:4.0.278.0
  • cpe:2.3:a:google:chrome:5.0.356.0
  • cpe:2.3:a:google:chrome:5.0.355.0
  • Google Chrome 5.0.356.2
    cpe:2.3:a:google:chrome:5.0.356.2
  • Google Chrome 5.0.356.1
    cpe:2.3:a:google:chrome:5.0.356.1
  • Google Chrome 5.0.353.0
    cpe:2.3:a:google:chrome:5.0.353.0
  • Google Chrome 5.0.351.0
    cpe:2.3:a:google:chrome:5.0.351.0
  • Google Chrome 5.0.354.1
    cpe:2.3:a:google:chrome:5.0.354.1
  • cpe:2.3:a:google:chrome:5.0.354.0
  • cpe:2.3:a:google:chrome:5.0.349.0
  • Google Chrome 5.0.348.0
    cpe:2.3:a:google:chrome:5.0.348.0
  • Google Chrome 5.0.350.1
    cpe:2.3:a:google:chrome:5.0.350.1
  • cpe:2.3:a:google:chrome:5.0.350.0
  • Google Chrome 5.0.345.0
    cpe:2.3:a:google:chrome:5.0.345.0
  • Google Chrome 5.0.344.0
    cpe:2.3:a:google:chrome:5.0.344.0
  • Google Chrome 5.0.347.0
    cpe:2.3:a:google:chrome:5.0.347.0
  • Google Chrome 5.0.346.0
    cpe:2.3:a:google:chrome:5.0.346.0
  • Google Chrome 5.0.342.7
    cpe:2.3:a:google:chrome:5.0.342.7
  • Google Chrome 5.0.342.8
    cpe:2.3:a:google:chrome:5.0.342.8
  • Google Chrome 5.0.342.9
    cpe:2.3:a:google:chrome:5.0.342.9
  • Google Chrome 5.0.343.0
    cpe:2.3:a:google:chrome:5.0.343.0
  • Google Chrome 5.0.342.3
    cpe:2.3:a:google:chrome:5.0.342.3
  • Google Chrome 5.0.342.4
    cpe:2.3:a:google:chrome:5.0.342.4
  • Google Chrome 5.0.342.5
    cpe:2.3:a:google:chrome:5.0.342.5
  • cpe:2.3:a:google:chrome:5.0.342.6
  • Google Chrome 5.0.341.0
    cpe:2.3:a:google:chrome:5.0.341.0
  • cpe:2.3:a:google:chrome:5.0.342.0
  • cpe:2.3:a:google:chrome:5.0.342.1
  • Google Chrome 5.0.342.2
    cpe:2.3:a:google:chrome:5.0.342.2
  • Google Chrome 5.0.337.0
    cpe:2.3:a:google:chrome:5.0.337.0
  • Google Chrome 5.0.338.0
    cpe:2.3:a:google:chrome:5.0.338.0
  • Google Chrome 5.0.339.0
    cpe:2.3:a:google:chrome:5.0.339.0
  • Google Chrome 5.0.340.0
    cpe:2.3:a:google:chrome:5.0.340.0
  • Google Chrome 5.0.336.0
    cpe:2.3:a:google:chrome:5.0.336.0
  • Google Chrome 5.0.375.125
    cpe:2.3:a:google:chrome:5.0.375.125
  • cpe:2.3:a:google:chrome:5.0.335.4
  • cpe:2.3:a:google:chrome:5.0.335.3
  • Google Chrome 5.0.335.2
    cpe:2.3:a:google:chrome:5.0.335.2
  • cpe:2.3:a:google:chrome:5.0.335.1
  • Google Chrome 5.0.335.0
    cpe:2.3:a:google:chrome:5.0.335.0
  • Google Chrome 5.0.334.0
    cpe:2.3:a:google:chrome:5.0.334.0
  • Google Chrome 5.0.333.0
    cpe:2.3:a:google:chrome:5.0.333.0
  • cpe:2.3:a:google:chrome:5.0.332.0
  • Google Chrome 5.0.330.0
    cpe:2.3:a:google:chrome:5.0.330.0
  • Google Chrome 5.0.329.0
    cpe:2.3:a:google:chrome:5.0.329.0
  • Google Chrome 5.0.328.0
    cpe:2.3:a:google:chrome:5.0.328.0
  • Google Chrome 5.0.327.0
    cpe:2.3:a:google:chrome:5.0.327.0
  • Google Chrome 5.0.326.0
    cpe:2.3:a:google:chrome:5.0.326.0
  • cpe:2.3:a:google:chrome:5.0.325.0
  • Google Chrome 5.0.324.0
    cpe:2.3:a:google:chrome:5.0.324.0
  • cpe:2.3:a:google:chrome:5.0.322.2
  • Google Chrome 5.0.323.0
    cpe:2.3:a:google:chrome:5.0.323.0
  • Google Chrome 5.0.322.0
    cpe:2.3:a:google:chrome:5.0.322.0
  • cpe:2.3:a:google:chrome:5.0.322.1
  • cpe:2.3:a:google:chrome:5.0.320.0
  • Google Chrome 5.0.321.0
    cpe:2.3:a:google:chrome:5.0.321.0
  • cpe:2.3:a:google:chrome:5.0.318.0
  • Google Chrome 5.0.319.0
    cpe:2.3:a:google:chrome:5.0.319.0
  • Google Chrome 5.0.317.1
    cpe:2.3:a:google:chrome:5.0.317.1
  • Google Chrome 5.0.317.2
    cpe:2.3:a:google:chrome:5.0.317.2
  • Google Chrome 5.0.316.0
    cpe:2.3:a:google:chrome:5.0.316.0
  • Google Chrome 5.0.317.0
    cpe:2.3:a:google:chrome:5.0.317.0
  • cpe:2.3:a:google:chrome:5.0.314.1
  • Google Chrome 5.0.315.0
    cpe:2.3:a:google:chrome:5.0.315.0
  • cpe:2.3:a:google:chrome:5.0.375.12
  • Google Chrome 5.0.375.11
    cpe:2.3:a:google:chrome:5.0.375.11
  • cpe:2.3:a:google:chrome:5.0.375.10
  • cpe:2.3:a:google:chrome:5.0.375.15
  • cpe:2.3:a:google:chrome:5.0.375.14
  • cpe:2.3:a:google:chrome:5.0.375.13
  • cpe:2.3:a:google:chrome:5.0.375.127
  • Google Chrome 5.0.375.126
    cpe:2.3:a:google:chrome:5.0.375.126
  • Google Chrome 5.0.358.0
    cpe:2.3:a:google:chrome:5.0.358.0
  • cpe:2.3:a:google:chrome:5.0.357.0
  • cpe:2.3:a:google:chrome:5.0.360.0
  • Google Chrome 5.0.359.0
    cpe:2.3:a:google:chrome:5.0.359.0
  • Google Chrome 5.0.360.4
    cpe:2.3:a:google:chrome:5.0.360.4
  • cpe:2.3:a:google:chrome:5.0.360.3
  • Google Chrome 5.0.361.0
    cpe:2.3:a:google:chrome:5.0.361.0
  • cpe:2.3:a:google:chrome:5.0.360.5
  • cpe:2.3:a:google:chrome:5.0.363.0
  • Google Chrome 5.0.362.0
    cpe:2.3:a:google:chrome:5.0.362.0
  • Google Chrome 5.0.365.0
    cpe:2.3:a:google:chrome:5.0.365.0
  • Google Chrome 5.0.364.0
    cpe:2.3:a:google:chrome:5.0.364.0
  • cpe:2.3:a:google:chrome:5.0.366.1
  • cpe:2.3:a:google:chrome:5.0.366.0
  • Google Chrome 5.0.366.3
    cpe:2.3:a:google:chrome:5.0.366.3
  • Google Chrome 5.0.366.2
    cpe:2.3:a:google:chrome:5.0.366.2
  • Google Chrome 5.0.366.4
    cpe:2.3:a:google:chrome:5.0.366.4
  • Google Chrome 5.0.367.0
    cpe:2.3:a:google:chrome:5.0.367.0
  • Google Chrome 5.0.368.0
    cpe:2.3:a:google:chrome:5.0.368.0
  • Google Chrome 5.0.369.0
    cpe:2.3:a:google:chrome:5.0.369.0
  • cpe:2.3:a:google:chrome:5.0.369.1
  • cpe:2.3:a:google:chrome:5.0.369.2
  • Google Chrome 5.0.370.0
    cpe:2.3:a:google:chrome:5.0.370.0
  • cpe:2.3:a:google:chrome:5.0.371.0
  • Google Chrome 5.0.372.0
    cpe:2.3:a:google:chrome:5.0.372.0
  • cpe:2.3:a:google:chrome:5.0.373.0
  • cpe:2.3:a:google:chrome:5.0.374.0
  • Google Chrome 5.0.375.0
    cpe:2.3:a:google:chrome:5.0.375.0
  • cpe:2.3:a:google:chrome:5.0.375.1
  • cpe:2.3:a:google:chrome:5.0.375.84
  • cpe:2.3:a:google:chrome:5.0.375.85
  • cpe:2.3:a:google:chrome:5.0.375.86
  • cpe:2.3:a:google:chrome:5.0.375.87
  • cpe:2.3:a:google:chrome:5.0.375.80
  • Google Chrome 5.0.375.81
    cpe:2.3:a:google:chrome:5.0.375.81
  • Google Chrome 5.0.375.82
    cpe:2.3:a:google:chrome:5.0.375.82
  • cpe:2.3:a:google:chrome:5.0.375.83
  • cpe:2.3:a:google:chrome:5.0.375.76
  • cpe:2.3:a:google:chrome:5.0.375.77
  • cpe:2.3:a:google:chrome:5.0.375.78
  • Google Chrome 5.0.375.79
    cpe:2.3:a:google:chrome:5.0.375.79
  • cpe:2.3:a:google:chrome:5.0.375.72
  • cpe:2.3:a:google:chrome:5.0.375.73
  • cpe:2.3:a:google:chrome:5.0.375.74
  • Google Chrome 5.0.375.75
    cpe:2.3:a:google:chrome:5.0.375.75
  • Google Chrome 5.0.375.54
    cpe:2.3:a:google:chrome:5.0.375.54
  • cpe:2.3:a:google:chrome:5.0.375.97
  • Google Chrome 5.0.375.96
    cpe:2.3:a:google:chrome:5.0.375.96
  • cpe:2.3:a:google:chrome:5.0.375.99
  • cpe:2.3:a:google:chrome:5.0.375.98
  • cpe:2.3:a:google:chrome:5.0.375.93
  • cpe:2.3:a:google:chrome:5.0.375.92
  • Google Chrome 5.0.375.95
    cpe:2.3:a:google:chrome:5.0.375.95
  • Google Chrome 5.0.375.94
    cpe:2.3:a:google:chrome:5.0.375.94
  • cpe:2.3:a:google:chrome:5.0.375.89
  • cpe:2.3:a:google:chrome:5.0.375.88
  • cpe:2.3:a:google:chrome:5.0.375.91
  • Google Chrome 5.0.375.90
    cpe:2.3:a:google:chrome:5.0.375.90
  • Google Chrome 5.0.375.71
    cpe:2.3:a:google:chrome:5.0.375.71
  • cpe:2.3:a:google:chrome:5.0.375.50
  • cpe:2.3:a:google:chrome:5.0.375.70
  • Google Chrome 5.0.375.51
    cpe:2.3:a:google:chrome:5.0.375.51
  • cpe:2.3:a:google:chrome:5.0.375.52
  • cpe:2.3:a:google:chrome:5.0.375.53
  • cpe:2.3:a:google:chrome:5.0.375.46
  • cpe:2.3:a:google:chrome:5.0.375.47
  • cpe:2.3:a:google:chrome:5.0.375.48
  • Google Chrome 5.0.375.49
    cpe:2.3:a:google:chrome:5.0.375.49
  • Google Chrome 5.0.375.42
    cpe:2.3:a:google:chrome:5.0.375.42
  • Google Chrome 5.0.375.43
    cpe:2.3:a:google:chrome:5.0.375.43
  • cpe:2.3:a:google:chrome:5.0.375.44
  • cpe:2.3:a:google:chrome:5.0.375.45
  • cpe:2.3:a:google:chrome:5.0.375.39
  • Google Chrome 5.0.375.40
    cpe:2.3:a:google:chrome:5.0.375.40
  • cpe:2.3:a:google:chrome:5.0.375.41
  • cpe:2.3:a:google:chrome:5.0.375.8
  • Google Chrome 5.0.375.7
    cpe:2.3:a:google:chrome:5.0.375.7
  • cpe:2.3:a:google:chrome:5.0.375.6
  • cpe:2.3:a:google:chrome:5.0.375.5
  • Google Chrome 5.0.375.9
    cpe:2.3:a:google:chrome:5.0.375.9
  • cpe:2.3:a:google:chrome:5.0.375.16
  • Google Chrome 5.0.375.20
    cpe:2.3:a:google:chrome:5.0.375.20
  • Google Chrome 5.0.375.19
    cpe:2.3:a:google:chrome:5.0.375.19
  • cpe:2.3:a:google:chrome:5.0.375.18
  • Google Chrome 5.0.375.17
    cpe:2.3:a:google:chrome:5.0.375.17
  • cpe:2.3:a:google:chrome:5.0.375.23
  • Google Chrome 5.0.375.25
    cpe:2.3:a:google:chrome:5.0.375.25
  • Google Chrome 5.0.375.21
    cpe:2.3:a:google:chrome:5.0.375.21
  • Google Chrome 5.0.375.22
    cpe:2.3:a:google:chrome:5.0.375.22
  • Google Chrome 5.0.375.28
    cpe:2.3:a:google:chrome:5.0.375.28
  • Google Chrome 5.0.375.29
    cpe:2.3:a:google:chrome:5.0.375.29
  • Google Chrome 5.0.375.26
    cpe:2.3:a:google:chrome:5.0.375.26
  • Google Chrome 5.0.375.27
    cpe:2.3:a:google:chrome:5.0.375.27
  • Google Chrome 5.0.375.32
    cpe:2.3:a:google:chrome:5.0.375.32
  • cpe:2.3:a:google:chrome:5.0.375.33
  • cpe:2.3:a:google:chrome:5.0.375.30
  • cpe:2.3:a:google:chrome:5.0.375.31
  • Google Chrome 5.0.375.36
    cpe:2.3:a:google:chrome:5.0.375.36
  • Google Chrome 5.0.375.37
    cpe:2.3:a:google:chrome:5.0.375.37
  • cpe:2.3:a:google:chrome:5.0.375.34
  • Google Chrome 5.0.375.35
    cpe:2.3:a:google:chrome:5.0.375.35
  • cpe:2.3:a:google:chrome:5.0.375.65
  • cpe:2.3:a:google:chrome:5.0.375.66
  • Google Chrome 5.0.375.63
    cpe:2.3:a:google:chrome:5.0.375.63
  • Google Chrome 5.0.375.64
    cpe:2.3:a:google:chrome:5.0.375.64
  • cpe:2.3:a:google:chrome:5.0.375.69
  • cpe:2.3:a:google:chrome:5.0.375.2
  • Google Chrome 5.0.375.67
    cpe:2.3:a:google:chrome:5.0.375.67
  • cpe:2.3:a:google:chrome:5.0.375.3
  • cpe:2.3:a:google:chrome:5.0.375.68
  • Google Chrome 5.0.375.4
    cpe:2.3:a:google:chrome:5.0.375.4
  • cpe:2.3:a:google:chrome:5.0.375.60
  • cpe:2.3:a:google:chrome:5.0.375.59
  • cpe:2.3:a:google:chrome:5.0.375.62
  • Google Chrome 5.0.375.61
    cpe:2.3:a:google:chrome:5.0.375.61
  • cpe:2.3:a:google:chrome:5.0.375.56
  • Google Chrome 5.0.375.55
    cpe:2.3:a:google:chrome:5.0.375.55
  • cpe:2.3:a:google:chrome:5.0.375.58
  • cpe:2.3:a:google:chrome:5.0.375.57
  • Google Chrome 5.0.381.0
    cpe:2.3:a:google:chrome:5.0.381.0
  • cpe:2.3:a:google:chrome:5.0.380.0
  • cpe:2.3:a:google:chrome:5.0.382.3
  • cpe:2.3:a:google:chrome:5.0.382.0
  • cpe:2.3:a:google:chrome:5.0.376.0
  • Google Chrome 5.0.375.38
    cpe:2.3:a:google:chrome:5.0.375.38
  • cpe:2.3:a:google:chrome:5.0.379.0
  • cpe:2.3:a:google:chrome:5.0.378.0
  • Google Chrome 5.0.384.0
    cpe:2.3:a:google:chrome:5.0.384.0
  • Google Chrome 5.0.383.0
    cpe:2.3:a:google:chrome:5.0.383.0
  • Google Chrome 6.0.399.0
    cpe:2.3:a:google:chrome:6.0.399.0
  • cpe:2.3:a:google:chrome:6.0.400.0
  • Google Chrome 6.0.401.0
    cpe:2.3:a:google:chrome:6.0.401.0
  • Google Chrome 6.0.405.0
    cpe:2.3:a:google:chrome:6.0.405.0
  • cpe:2.3:a:google:chrome:6.0.404.2
  • Google Chrome 6.0.407.0
    cpe:2.3:a:google:chrome:6.0.407.0
  • Google Chrome 6.0.406.0
    cpe:2.3:a:google:chrome:6.0.406.0
  • Google Chrome 6.0.403.0
    cpe:2.3:a:google:chrome:6.0.403.0
  • cpe:2.3:a:google:chrome:6.0.401.1
  • Google Chrome 6.0.404.1
    cpe:2.3:a:google:chrome:6.0.404.1
  • Google Chrome 6.0.404.0
    cpe:2.3:a:google:chrome:6.0.404.0
  • cpe:2.3:a:google:chrome:6.0.408.4
  • cpe:2.3:a:google:chrome:6.0.408.3
  • cpe:2.3:a:google:chrome:6.0.408.6
  • Google Chrome 6.0.408.5
    cpe:2.3:a:google:chrome:6.0.408.5
  • Google Chrome 6.0.408.10
    cpe:2.3:a:google:chrome:6.0.408.10
  • cpe:2.3:a:google:chrome:6.0.408.0
  • Google Chrome 6.0.408.2
    cpe:2.3:a:google:chrome:6.0.408.2
  • cpe:2.3:a:google:chrome:6.0.408.1
  • Google Chrome 6.0.412.0
    cpe:2.3:a:google:chrome:6.0.412.0
  • Google Chrome 6.0.413.0
    cpe:2.3:a:google:chrome:6.0.413.0
  • cpe:2.3:a:google:chrome:6.0.410.0
  • cpe:2.3:a:google:chrome:6.0.411.0
  • Google Chrome 6.0.408.9
    cpe:2.3:a:google:chrome:6.0.408.9
  • Google Chrome 6.0.409.0
    cpe:2.3:a:google:chrome:6.0.409.0
  • Google Chrome 6.0.408.7
    cpe:2.3:a:google:chrome:6.0.408.7
  • cpe:2.3:a:google:chrome:6.0.408.8
  • cpe:2.3:a:google:chrome:6.0.418.0
  • Google Chrome 6.0.418.1
    cpe:2.3:a:google:chrome:6.0.418.1
  • Google Chrome 6.0.416.1
    cpe:2.3:a:google:chrome:6.0.416.1
  • cpe:2.3:a:google:chrome:6.0.417.0
  • cpe:2.3:a:google:chrome:6.0.415.1
  • cpe:2.3:a:google:chrome:6.0.416.0
  • Google Chrome 6.0.414.0
    cpe:2.3:a:google:chrome:6.0.414.0
  • cpe:2.3:a:google:chrome:6.0.415.0
  • Google Chrome 6.0.418.9
    cpe:2.3:a:google:chrome:6.0.418.9
  • cpe:2.3:a:google:chrome:6.0.418.8
  • Google Chrome 6.0.418.7
    cpe:2.3:a:google:chrome:6.0.418.7
  • cpe:2.3:a:google:chrome:6.0.418.6
  • Google Chrome 6.0.418.5
    cpe:2.3:a:google:chrome:6.0.418.5
  • Google Chrome 6.0.418.4
    cpe:2.3:a:google:chrome:6.0.418.4
  • cpe:2.3:a:google:chrome:6.0.418.3
  • Google Chrome 6.0.418.2
    cpe:2.3:a:google:chrome:6.0.418.2
  • Google Chrome 6.0.427.0
    cpe:2.3:a:google:chrome:6.0.427.0
  • cpe:2.3:a:google:chrome:6.0.426.0
  • cpe:2.3:a:google:chrome:6.0.425.0
  • Google Chrome 6.0.424.0
    cpe:2.3:a:google:chrome:6.0.424.0
  • cpe:2.3:a:google:chrome:6.0.423.0
  • cpe:2.3:a:google:chrome:6.0.422.0
  • cpe:2.3:a:google:chrome:6.0.421.0
  • Google Chrome 6.0.419.0
    cpe:2.3:a:google:chrome:6.0.419.0
  • Google Chrome 6.0.450.2
    cpe:2.3:a:google:chrome:6.0.450.2
  • Google Chrome 6.0.450.3
    cpe:2.3:a:google:chrome:6.0.450.3
  • cpe:2.3:a:google:chrome:6.0.450.0
  • cpe:2.3:a:google:chrome:6.0.450.1
  • cpe:2.3:a:google:chrome:6.0.452.0
  • Google Chrome 6.0.452.1
    cpe:2.3:a:google:chrome:6.0.452.1
  • cpe:2.3:a:google:chrome:6.0.450.4
  • cpe:2.3:a:google:chrome:6.0.451.0
  • Google Chrome 6.0.445.1
    cpe:2.3:a:google:chrome:6.0.445.1
  • cpe:2.3:a:google:chrome:6.0.446.0
  • Google Chrome 6.0.444.0
    cpe:2.3:a:google:chrome:6.0.444.0
  • Google Chrome 6.0.445.0
    cpe:2.3:a:google:chrome:6.0.445.0
  • Google Chrome 6.0.447.2
    cpe:2.3:a:google:chrome:6.0.447.2
  • cpe:2.3:a:google:chrome:6.0.449.0
  • Google Chrome 6.0.447.0
    cpe:2.3:a:google:chrome:6.0.447.0
  • Google Chrome 6.0.447.1
    cpe:2.3:a:google:chrome:6.0.447.1
  • Google Chrome 6.0.437.3
    cpe:2.3:a:google:chrome:6.0.437.3
  • cpe:2.3:a:google:chrome:6.0.437.2
  • Google Chrome 6.0.437.1
    cpe:2.3:a:google:chrome:6.0.437.1
  • Google Chrome 6.0.437.0
    cpe:2.3:a:google:chrome:6.0.437.0
  • cpe:2.3:a:google:chrome:6.0.443.0
  • Google Chrome 6.0.441.0
    cpe:2.3:a:google:chrome:6.0.441.0
  • Google Chrome 6.0.440.0
    cpe:2.3:a:google:chrome:6.0.440.0
  • Google Chrome 6.0.438.0
    cpe:2.3:a:google:chrome:6.0.438.0
  • Google Chrome 6.0.432.0
    cpe:2.3:a:google:chrome:6.0.432.0
  • Google Chrome 6.0.431.0
    cpe:2.3:a:google:chrome:6.0.431.0
  • Google Chrome 6.0.430.0
    cpe:2.3:a:google:chrome:6.0.430.0
  • Google Chrome 6.0.428.0
    cpe:2.3:a:google:chrome:6.0.428.0
  • cpe:2.3:a:google:chrome:6.0.436.0
  • Google Chrome 6.0.435.0
    cpe:2.3:a:google:chrome:6.0.435.0
  • cpe:2.3:a:google:chrome:6.0.434.0
  • Google Chrome 6.0.433.0
    cpe:2.3:a:google:chrome:6.0.433.0
  • Google Chrome 6.0.453.1
    cpe:2.3:a:google:chrome:6.0.453.1
  • Google Chrome 6.0.453.0
    cpe:2.3:a:google:chrome:6.0.453.0
  • cpe:2.3:a:google:chrome:5.0.390.0
  • cpe:2.3:a:google:chrome:5.0.387.0
  • cpe:2.3:a:google:chrome:5.0.392.0
  • Google Chrome 5.0.391.0
    cpe:2.3:a:google:chrome:5.0.391.0
  • Google Chrome 5.0.386.0
    cpe:2.3:a:google:chrome:5.0.386.0
  • Google Chrome 5.0.385.0
    cpe:2.3:a:google:chrome:5.0.385.0
  • cpe:2.3:a:google:chrome:6.0.397.0
  • cpe:2.3:a:google:chrome:6.0.398.0
  • cpe:2.3:a:google:chrome:5.0.393.0
  • Google Chrome 5.0.394.0
    cpe:2.3:a:google:chrome:5.0.394.0
  • cpe:2.3:a:google:chrome:5.0.395.0
  • Google Chrome 5.0.396.0
    cpe:2.3:a:google:chrome:5.0.396.0
  • cpe:2.3:a:google:chrome:7.0.517.40
  • cpe:2.3:a:google:chrome:7.0.517.41
  • Google Chrome 7.0.517.42
    cpe:2.3:a:google:chrome:7.0.517.42
  • cpe:2.3:a:google:chrome:7.0.517.43
  • cpe:2.3:a:google:chrome:7.0.517.44
  • Google Chrome 7.0.518.0
    cpe:2.3:a:google:chrome:7.0.518.0
  • Google Chrome 7.0.519.0
    cpe:2.3:a:google:chrome:7.0.519.0
  • cpe:2.3:a:google:chrome:7.0.520.0
  • Google Chrome 7.0.521.0
    cpe:2.3:a:google:chrome:7.0.521.0
  • Google Chrome 7.0.522.0
    cpe:2.3:a:google:chrome:7.0.522.0
  • Google Chrome 7.0.524.0
    cpe:2.3:a:google:chrome:7.0.524.0
  • cpe:2.3:a:google:chrome:7.0.525.0
  • cpe:2.3:a:google:chrome:7.0.526.0
  • cpe:2.3:a:google:chrome:7.0.528.0
  • Google Chrome 7.0.5209.0
    cpe:2.3:a:google:chrome:7.0.529.0
  • cpe:2.3:a:google:chrome:7.0.529.1
  • cpe:2.3:a:google:chrome:7.0.529.2
  • cpe:2.3:a:google:chrome:7.0.530.0
  • cpe:2.3:a:google:chrome:7.0.531.0
  • cpe:2.3:a:google:chrome:7.0.531.1
  • Google Chrome 7.0.5231.2
    cpe:2.3:a:google:chrome:7.0.531.2
  • cpe:2.3:a:google:chrome:7.0.535.1
  • Google Chrome 7.0.535.2
    cpe:2.3:a:google:chrome:7.0.535.2
  • Google Chrome 7.0.536.0
    cpe:2.3:a:google:chrome:7.0.536.0
  • cpe:2.3:a:google:chrome:7.0.536.1
  • cpe:2.3:a:google:chrome:7.0.536.2
  • Google Chrome 7.0.536.3
    cpe:2.3:a:google:chrome:7.0.536.3
  • cpe:2.3:a:google:chrome:7.0.536.4
  • cpe:2.3:a:google:chrome:7.0.537.0
  • cpe:2.3:a:google:chrome:7.0.538.0
  • cpe:2.3:a:google:chrome:7.0.539.0
  • cpe:2.3:a:google:chrome:7.0.540.0
  • cpe:2.3:a:google:chrome:7.0.541.0
  • cpe:2.3:a:google:chrome:7.0.542.0
  • Google Chrome 7.0.544.0
    cpe:2.3:a:google:chrome:7.0.544.0
  • Google Chrome 7.0.547.0
    cpe:2.3:a:google:chrome:7.0.547.0
  • cpe:2.3:a:google:chrome:7.0.547.1
  • Google Chrome 7.0.548.0
    cpe:2.3:a:google:chrome:7.0.548.0
  • cpe:2.3:a:google:chrome:8.0.549.0
  • Google Chrome 8.0.550.0
    cpe:2.3:a:google:chrome:8.0.550.0
  • cpe:2.3:a:google:chrome:8.0.551.0
  • cpe:2.3:a:google:chrome:8.0.551.1
  • cpe:2.3:a:google:chrome:8.0.552.0
  • Google Chrome 8.0.552.1
    cpe:2.3:a:google:chrome:8.0.552.1
  • cpe:2.3:a:google:chrome:8.0.552.10
  • cpe:2.3:a:google:chrome:8.0.552.100
  • Google Chrome 8.0.552.101
    cpe:2.3:a:google:chrome:8.0.552.101
  • Google Chrome 8.0.552.102
    cpe:2.3:a:google:chrome:8.0.552.102
  • Google Chrome 8.0.552.103
    cpe:2.3:a:google:chrome:8.0.552.103
  • Google Chrome 8.0.552.104
    cpe:2.3:a:google:chrome:8.0.552.104
  • cpe:2.3:a:google:chrome:8.0.552.105
  • cpe:2.3:a:google:chrome:8.0.552.11
  • cpe:2.3:a:google:chrome:8.0.552.12
  • Google Chrome 8.0.552.13
    cpe:2.3:a:google:chrome:8.0.552.13
  • Google Chrome 8.0.552.14
    cpe:2.3:a:google:chrome:8.0.552.14
  • Google Chrome 8.0.552.15
    cpe:2.3:a:google:chrome:8.0.552.15
  • Google Chrome 8.0.552.16
    cpe:2.3:a:google:chrome:8.0.552.16
  • cpe:2.3:a:google:chrome:8.0.552.17
  • cpe:2.3:a:google:chrome:8.0.552.18
  • Google Chrome 8.0.552.19
    cpe:2.3:a:google:chrome:8.0.552.19
  • cpe:2.3:a:google:chrome:8.0.552.20
  • Google Chrome 8.0.552.2
    cpe:2.3:a:google:chrome:8.0.552.2
  • cpe:2.3:a:google:chrome:8.0.552.200
  • cpe:2.3:a:google:chrome:8.0.552.201
  • cpe:2.3:a:google:chrome:8.0.552.202
  • Google Chrome 8.0.552.203
    cpe:2.3:a:google:chrome:8.0.552.203
  • cpe:2.3:a:google:chrome:8.0.552.204
  • cpe:2.3:a:google:chrome:8.0.552.205
  • Google Chrome 8.0.552.206
    cpe:2.3:a:google:chrome:8.0.552.206
  • Google Chrome 8.0.552.207
    cpe:2.3:a:google:chrome:8.0.552.207
  • Google Chrome 8.0.552.208
    cpe:2.3:a:google:chrome:8.0.552.208
  • cpe:2.3:a:google:chrome:8.0.552.209
  • cpe:2.3:a:google:chrome:8.0.552.21
  • Google Chrome 8.0.552.210
    cpe:2.3:a:google:chrome:8.0.552.210
  • Google Chrome 8.0.552.211
    cpe:2.3:a:google:chrome:8.0.552.211
  • Google Chrome 8.0.552.212
    cpe:2.3:a:google:chrome:8.0.552.212
  • Google Chrome 8.0.552.213
    cpe:2.3:a:google:chrome:8.0.552.213
  • Google Chrome 8.0.552.214
    cpe:2.3:a:google:chrome:8.0.552.214
CVSS
Base: 10.0 (as of 08-12-2010 - 14:05)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_6_7.NASL
    description The remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.7. Mac OS X 10.6.7 contains security fixes for the following products : - AirPort - Apache - AppleScript - ATS - bzip2 - CarbonCore - ClamAV - CoreText - File Quarantine - HFS - ImageIO - Image RAW - Installer - Kerberos - Kernel - Libinfo - libxml - Mailman - PHP - QuickLook - QuickTime - Ruby - Samba - Subversion - Terminal - X11
    last seen 2019-02-21
    modified 2018-08-22
    plugin id 52754
    published 2011-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52754
    title Mac OS X 10.6.x < 10.6.7 Multiple Vulnerabilities
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2137.NASL
    description Yang Dingning discovered a double free in libxml's Xpath processing, which might allow the execution of arbitrary code.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 51399
    published 2011-01-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=51399
    title Debian DSA-2137-1 : libxml2 - several vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-2699.NASL
    description fix a case of double free in XPath Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 53435
    published 2011-04-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53435
    title Fedora 13 : libxml2-2.7.7-2.fc13 (2011-2699)
  • NASL family Windows
    NASL id OPENOFFICE_33.NASL
    description The version of Oracle OpenOffice.org installed on the remote host is prior to 3.3. It is, therefore, affected by several issues : - Issues exist relating to PowerPoint document processing that may lead to arbitrary code execution. (CVE-2010-2935, CVE-2010-2936) - A directory traversal vulnerability exists in zip / jar package extraction. (CVE-2010-3450) - Issues exist relating to RTF document processing that may lead to arbitrary code execution. (CVE-2010-3451, CVE-2010-3452) - Issues exist relating to Word document processing that may lead to arbitrary code execution. (CVE-2010-3453, CVE-2010-3454) - Issues exist in the third-party XPDF library relating to PDF document processing that may allow arbitrary code execution. (CVE-2010-3702, CVE-2010-3704) - OpenOffice.org includes a version of LIBXML2 that is affected by multiple vulnerabilities. (CVE-2010-4008, CVE-2010-4494) - An issue exists with PNG file processing that may allow arbitrary code execution. (CVE-2010-4253) - An issue exists with TGA file processing that may allow arbitrary code execution. (CVE-2010-4643)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 51773
    published 2011-01-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=51773
    title Oracle OpenOffice.org < 3.3 Multiple Vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-2697.NASL
    description Fixes a possible double free in XPath evaluation Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 52645
    published 2011-03-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52645
    title Fedora 14 : libxml2-2.7.7-3.fc14 (2011-2697)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-4214.NASL
    description fix a double free in XPath Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 53225
    published 2011-03-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53225
    title Fedora 15 : libxml2-2.7.8-6.fc15 (2011-4214)
  • NASL family Windows
    NASL id SAFARI_5_0_4.NASL
    description The version of Safari installed on the remote Windows host is earlier than 5.0.4. It therefore is potentially affected by several issues in the following components : - ImageIO - libxml - WebKit
    last seen 2019-02-21
    modified 2018-07-27
    plugin id 52613
    published 2011-03-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52613
    title Safari < 5.0.4 Multiple Vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LIBXML2-110105.NASL
    description A bug in the Xpath processing inside libxml2 has been fixed. CVE-2010-4494 was assigned to this issue.
    last seen 2018-09-01
    modified 2013-10-25
    plugin id 53253
    published 2011-04-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53253
    title SuSE 11.1 Security Update : libxml2 (SAT Patch Number 3775)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_LIBXML2-110104.NASL
    description A bug in the Xpath processing inside libxml2 has been fixed. CVE-2010-4494 has been assigned to this issue.
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 75633
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75633
    title openSUSE Security Update : libxml2 (openSUSE-SU-2011:0255-1)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SAFARI5_0_4.NASL
    description The version of Apple Safari installed on the remote Mac OS X host is earlier than 5.0.4. As such, it is potentially affected by several issues in the following components : - libxml - WebKit
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 52612
    published 2011-03-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52612
    title Mac OS X : Apple Safari < 5.0.4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_LIBXML2-110104.NASL
    description A bug in the Xpath processing inside libxml2 has been fixed. CVE-2010-4494 has been assigned to this issue.
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 53766
    published 2011-05-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53766
    title openSUSE Security Update : libxml2 (openSUSE-SU-2011:0255-1)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2010-260.NASL
    description A vulnerability was discovered and corrected in libxml2 : A double free vulnerability in libxml2 (xpath.c) allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling (CVE-2010-4494). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90 The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 51793
    published 2011-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=51793
    title Mandriva Linux Security Advisory : libxml2 (MDVSA-2010:260)
  • NASL family Windows
    NASL id ITUNES_10_2.NASL
    description The version of Apple iTunes installed on the remote Windows host is older than 10.2. As such, it is affected by numerous issues in the following components : - ImageIO - libxml - WebKit
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 52534
    published 2011-03-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52534
    title Apple iTunes < 10.2 Multiple Vulnerabilities (credentialed check)
  • NASL family Peer-To-Peer File Sharing
    NASL id ITUNES_10_2_BANNER.NASL
    description The version of Apple iTunes on the remote host is prior to version 10.2. It is, therefore, affected by multiple vulnerabilities in the WebKit, ImageIO, and libxml components. Note that these only affect iTunes for Windows.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 52535
    published 2011-03-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52535
    title Apple iTunes < 10.2 Multiple Vulnerabilities (uncredentialed check)
  • NASL family Windows
    NASL id GOOGLE_CHROME_8_0_552_215.NASL
    description The version of Google Chrome installed on the remote host is earlier than 8.0.552.215. Such versions are reportedly affected by multiple vulnerabilities : - It may be possible to bypass the pop-up blocker. (Issue #17655) - A cross-origin video theft vulnerability exists related to canvas. (Issue #55745) - An unspecified crash exists when handling HTML5 databases. (Issue #56237) - Excessive file dialogs could lead to a browser crash. (Issue #58329) - A use after free error exists in history handling. (Issue #59554) - It may be possible to crash the browser when performing http proxy authentication. (Issue #61701) - An out-of-bounds read regression exists in the WebM video support. (Issue #61701) - It may be possible to crash the browser due to bad indexing with malformed video. (Issue #62127) - A memory corruption issue exists relating to malicious privileged extension. (Issue #62168) - A use-after-free error exists in the handling of SVG animations. (Issue #62401) - A use-after-free error exists in the mouse dragging event handling. (Issue #63051) - A double free error exists in XPath handling. (Issue #63444)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 50977
    published 2010-12-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50977
    title Google Chrome < 8.0.552.215 Multiple Vulnerabilities
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20130131_MINGW32_LIBXML2_ON_SL6_X.NASL
    description IMPORTANT NOTE: The mingw32 packages in Scientific Linux 6 will no longer be updated proactively and will be deprecated with the release of Scientific Linux 6.4. These packages were provided to support other capabilities in Scientific Linux and were not intended for direct use. You are advised to not use these packages with immediate effect. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3919) A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-5134) It was found that the hashing routine used by libxml2 arrays was susceptible to predictable hash collisions. Sending a specially crafted message to an XML service could result in longer processing time, which could lead to a denial of service. To mitigate this issue, randomization has been added to the hashing function to reduce the chance of an attacker successfully causing intentional collisions. (CVE-2012-0841) Multiple flaws were found in the way libxml2 parsed certain XPath (XML Path Language) expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, CVE-2011-2834) Two heap-based buffer overflow flaws were found in the way libxml2 decoded certain XML files. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0216, CVE-2011-3102) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2011-1944) An out-of-bounds memory read flaw was found in libxml2. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash. (CVE-2011-3905)
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 64425
    published 2013-02-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64425
    title Scientific Linux Security Update : mingw32-libxml2 on SL6.x (x86_64)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-0217.NASL
    description Updated mingw32-libxml2 packages that fix several security issues are now available for Red Hat Enterprise Linux 6. This advisory also contains information about future updates for the mingw32 packages, as well as the deprecation of the packages with the release of Red Hat Enterprise Linux 6.4. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the libxml2 library, a development toolbox providing the implementation of various XML standards, for users of MinGW (Minimalist GNU for Windows). IMPORTANT NOTE: The mingw32 packages in Red Hat Enterprise Linux 6 will no longer be updated proactively and will be deprecated with the release of Red Hat Enterprise Linux 6.4. These packages were provided to support other capabilities in Red Hat Enterprise Linux and were not intended for direct customer use. Customers are advised to not use these packages with immediate effect. Future updates to these packages will be at Red Hat's discretion and these packages may be removed in a future minor release. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3919) A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-5134) It was found that the hashing routine used by libxml2 arrays was susceptible to predictable hash collisions. Sending a specially crafted message to an XML service could result in longer processing time, which could lead to a denial of service. To mitigate this issue, randomization has been added to the hashing function to reduce the chance of an attacker successfully causing intentional collisions. (CVE-2012-0841) Multiple flaws were found in the way libxml2 parsed certain XPath (XML Path Language) expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, CVE-2011-2834) Two heap-based buffer overflow flaws were found in the way libxml2 decoded certain XML files. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0216, CVE-2011-3102) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2011-1944) An out-of-bounds memory read flaw was found in libxml2. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash. (CVE-2011-3905) Red Hat would like to thank the Google Security Team for reporting the CVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the original reporter of CVE-2010-4008. All users of mingw32-libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 64384
    published 2013-02-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64384
    title CentOS 6 : mingw32-libxml2 (CESA-2013:0217)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-1749.NASL
    description Updated libxml2 packages that fix several security issues and various bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language (XPath), which is a language for addressing parts of an XML document. An off-by-one error, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XML files. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0216) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2011-1944) Multiple flaws were found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, CVE-2011-2834) Note: Red Hat does not ship any applications that use libxml2 in a way that would allow the CVE-2011-1944, CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, and CVE-2011-2834 flaws to be exploited; however, third-party applications may allow XPath expressions to be passed which could trigger these flaws. Red Hat would like to thank the Google Security Team for reporting the CVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the original reporter of CVE-2010-4008. This update also fixes the following bugs : * A number of patches have been applied to harden the XPath processing code in libxml2, such as fixing memory leaks, rounding errors, XPath numbers evaluations, and a potential error in encoding conversion. (BZ#732335) All users of libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57022
    published 2011-12-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57022
    title RHEL 6 : libxml2 (RHSA-2011:1749)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201110-26.NASL
    description The remote host is affected by the vulnerability described in GLSA-201110-26 (libxml2: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in libxml2. Please review the CVE identifiers referenced below for details. Impact : A local or remote attacker may be able to execute arbitrary code with the privileges of the application or cause a Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 56660
    published 2011-10-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56660
    title GLSA-201110-26 : libxml2: Multiple vulnerabilities
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20111206_LIBXML2_ON_SL6_X.NASL
    description The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language (XPath), which is a language for addressing parts of an XML document. An off-by-one error, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XML files. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0216) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2011-1944) Multiple flaws were found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, CVE-2011-2834) Note: Scientific Linux generally does not ship any applications that use libxml2 in a way that would allow the CVE-2011-1944, CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, and CVE-2011-2834 flaws to be exploited; however, third-party applications may allow XPath expressions to be passed which could trigger these flaws. This update also fixes the following bugs : - A number of patches have been applied to harden the XPath processing code in libxml2, such as fixing memory leaks, rounding errors, XPath numbers evaluations, and a potential error in encoding conversion. All users of libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61192
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61192
    title Scientific Linux Security Update : libxml2 on SL6.x i386/x86_64
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2012-0012.NASL
    description a. ESXi update to third-party component libxml2 The libxml2 third-party library has been updated which addresses multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-4008, CVE-2011-0216, CVE-2011-1944, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919 and CVE-2012-0841 to these issues.
    last seen 2019-02-21
    modified 2018-09-06
    plugin id 59966
    published 2012-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59966
    title VMSA-2012-0012 : VMware ESXi update to third-party library
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-0217.NASL
    description From Red Hat Security Advisory 2013:0217 : Updated mingw32-libxml2 packages that fix several security issues are now available for Red Hat Enterprise Linux 6. This advisory also contains information about future updates for the mingw32 packages, as well as the deprecation of the packages with the release of Red Hat Enterprise Linux 6.4. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the libxml2 library, a development toolbox providing the implementation of various XML standards, for users of MinGW (Minimalist GNU for Windows). IMPORTANT NOTE: The mingw32 packages in Red Hat Enterprise Linux 6 will no longer be updated proactively and will be deprecated with the release of Red Hat Enterprise Linux 6.4. These packages were provided to support other capabilities in Red Hat Enterprise Linux and were not intended for direct customer use. Customers are advised to not use these packages with immediate effect. Future updates to these packages will be at Red Hat's discretion and these packages may be removed in a future minor release. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3919) A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-5134) It was found that the hashing routine used by libxml2 arrays was susceptible to predictable hash collisions. Sending a specially crafted message to an XML service could result in longer processing time, which could lead to a denial of service. To mitigate this issue, randomization has been added to the hashing function to reduce the chance of an attacker successfully causing intentional collisions. (CVE-2012-0841) Multiple flaws were found in the way libxml2 parsed certain XPath (XML Path Language) expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, CVE-2011-2834) Two heap-based buffer overflow flaws were found in the way libxml2 decoded certain XML files. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0216, CVE-2011-3102) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2011-1944) An out-of-bounds memory read flaw was found in libxml2. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash. (CVE-2011-3905) Red Hat would like to thank the Google Security Team for reporting the CVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the original reporter of CVE-2010-4008. All users of mingw32-libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68721
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68721
    title Oracle Linux 6 : mingw32-libxml2 (ELSA-2013-0217)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-0217.NASL
    description Updated mingw32-libxml2 packages that fix several security issues are now available for Red Hat Enterprise Linux 6. This advisory also contains information about future updates for the mingw32 packages, as well as the deprecation of the packages with the release of Red Hat Enterprise Linux 6.4. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. These packages provide the libxml2 library, a development toolbox providing the implementation of various XML standards, for users of MinGW (Minimalist GNU for Windows). IMPORTANT NOTE: The mingw32 packages in Red Hat Enterprise Linux 6 will no longer be updated proactively and will be deprecated with the release of Red Hat Enterprise Linux 6.4. These packages were provided to support other capabilities in Red Hat Enterprise Linux and were not intended for direct customer use. Customers are advised to not use these packages with immediate effect. Future updates to these packages will be at Red Hat's discretion and these packages may be removed in a future minor release. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3919) A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-5134) It was found that the hashing routine used by libxml2 arrays was susceptible to predictable hash collisions. Sending a specially crafted message to an XML service could result in longer processing time, which could lead to a denial of service. To mitigate this issue, randomization has been added to the hashing function to reduce the chance of an attacker successfully causing intentional collisions. (CVE-2012-0841) Multiple flaws were found in the way libxml2 parsed certain XPath (XML Path Language) expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, CVE-2011-2834) Two heap-based buffer overflow flaws were found in the way libxml2 decoded certain XML files. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0216, CVE-2011-3102) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2011-1944) An out-of-bounds memory read flaw was found in libxml2. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash. (CVE-2011-3905) Red Hat would like to thank the Google Security Team for reporting the CVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the original reporter of CVE-2010-4008. All users of mingw32-libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 64391
    published 2013-02-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64391
    title RHEL 6 : mingw32-libxml2 (RHSA-2013:0217)
oval via4
accepted 2013-08-12T04:00:38.320-04:00
class vulnerability
contributors
  • name SecPod Team
    organization SecPod Technologies
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Maria Kedovskaya
    organization ALTX-SOFT
definition_extensions
comment Google Chrome is installed
oval oval:org.mitre.oval:def:11914
description Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
family windows
id oval:org.mitre.oval:def:11916
status accepted
submitted 2010-12-13T12:01:17
title Double free vulnerability in Google Chrome before 8.0.552.215 via vectors related to XPath handling
version 53
redhat via4
advisories
  • rhsa
    id RHSA-2011:1749
  • rhsa
    id RHSA-2013:0217
rpms
  • libxml2-0:2.7.6-4.el6
  • libxml2-devel-0:2.7.6-4.el6
  • libxml2-python-0:2.7.6-4.el6
  • libxml2-static-0:2.7.6-4.el6
  • mingw32-libxml2-0:2.7.6-6.el6_3
  • mingw32-libxml2-static-0:2.7.6-6.el6_3
refmap via4
apple
  • APPLE-SA-2011-03-02-1
  • APPLE-SA-2011-03-09-1
  • APPLE-SA-2011-03-09-2
  • APPLE-SA-2011-03-21-1
confirm
debian DSA-2137
fedora FEDORA-2011-2697
hp HPSBGN02970
mandriva MDVSA-2010:260
secunia
  • 40775
  • 42472
  • 42721
  • 42762
suse SUSE-SR:2011:005
vupen
  • ADV-2010-3319
  • ADV-2010-3336
  • ADV-2011-0230
Last major update 22-08-2016 - 22:02
Published 07-12-2010 - 16:00
Last modified 18-09-2017 - 21:31
Back to Top