Download
| Alert*
oval:org.secpod.oval:def:1601297
A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary c ... oval:org.secpod.oval:def:202260 The libxml2 library is a development toolbox providing the implementation of various XML standards. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially-crafted XML file that, when opened in an applicati ... oval:org.secpod.oval:def:202257 The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language , which is a language for addressing parts of an XML document. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references ... oval:org.secpod.oval:def:202241 The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language , which is a language for addressing parts of an XML document. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references ... oval:org.secpod.oval:def:600710 Many security problems had been fixed in libxml2, a popular library to handle XML data files. CVE-2011-3919: Jüri Aedla discovered a heap-based buffer overflow that allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. CVE-2011 ... oval:org.secpod.oval:def:3594 The host is installed with Google Chrome before 16.0.912.63 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle libxml2. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:104185 This library allows to manipulate XML files. It includes support to read, modify and write XML and HTML files. There is DTDs support this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream o ... oval:org.secpod.oval:def:1503908 Updated libxml2 packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are available ... oval:org.secpod.oval:def:3579 The host is installed with Google Chrome before 16.0.912.63 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle libxml2. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:3609 The host is installed with Google Chrome before 16.0.912.63 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle libxml2. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:202536 These packages provide the libxml2 library, a development toolbox providing the implementation of various XML standards, for users of MinGW . IMPORTANT NOTE: The mingw32 packages in Red Hat Enterprise Linux 6 will no longer be updated proactively and will be deprecated with the release of Red Hat En ... oval:org.secpod.oval:def:1000371 The remote host is missing a patch 125732-07 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:1000410 The remote host is missing a patch 125731-07 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:104191 This library allows to manipulate XML files. It includes support to read, modify and write XML and HTML files. There is DTDs support this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream o ... oval:org.secpod.oval:def:3624 The host is installed with Google Chrome before 16.0.912.63 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle libxml2. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:1500076 Updated mingw32-libxml2 packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 6. This advisory also containsinformation about future updates for the mingw32 packages, as well as thedeprecation of the packages with the release of Red HatEnterprise Linux 6.4.The Red H ... oval:org.secpod.oval:def:500725 The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language , which is a language for addressing parts of an XML document. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references ... oval:org.secpod.oval:def:500704 The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language , which is a language for addressing parts of an XML document. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references ... oval:org.secpod.oval:def:500707 The libxml2 library is a development toolbox providing the implementation of various XML standards. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially-crafted XML file that, when opened in an applicati ... oval:org.secpod.oval:def:700733 libxml2: GNOME XML library Applications using libxml2 could be made to crash or run programs as your login if they opened a specially crafted file. oval:org.secpod.oval:def:301098 Multiple vulnerabilities has been discovered and corrected in libxml2: Off-by-one error in libxml allows remote attackers to execute arbitrary code or cause a denial of service via a crafted web site CVE-2011-0216out-of-bounds read(CVE-2011-3905 |