Max CVSS | 10.0 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2017-9047 | 5.0 |
A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is ass
|
29-06-2021 - 15:15 | 18-05-2017 - 06:29 | |
CVE-2017-9048 | 5.0 |
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end o
|
29-06-2021 - 15:15 | 18-05-2017 - 06:29 | |
CVE-2017-9050 | 5.0 |
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incompl
|
29-06-2021 - 15:15 | 18-05-2017 - 06:29 | |
CVE-2017-9049 | 5.0 |
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an in
|
29-06-2021 - 15:15 | 18-05-2017 - 06:29 | |
CVE-2017-0663 | 6.8 |
A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execut
|
29-06-2021 - 15:15 | 14-06-2017 - 13:29 | |
CVE-2017-7376 | 10.0 |
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
|
17-05-2019 - 15:15 | 19-02-2018 - 19:29 | |
CVE-2017-7375 | 7.5 |
A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may exp
|
18-03-2018 - 14:17 | 19-02-2018 - 19:29 |