[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:400465
A Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.

oval:org.secpod.oval:def:400451
Chromium was updated to 25.0.1343 * Security Fixes : - CVE-2012-5131: Corrupt rendering in the Apple OSX driver for Intel GPUs - CVE-2012-5133: Use-after-free in SVG filters. - CVE-2012-5130: Out-of-bounds read in Skia - CVE-2012-5132: Browser crash with chunked encoding - CVE-2012-5134: Buffer unde ...

oval:org.secpod.oval:def:400456
A Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.

oval:org.secpod.oval:def:1601306
A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the pri ...

oval:org.secpod.oval:def:8126
The host is installed with Google Chrome before 23.0.1271.91 and is prone to heap-based buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle the xmlParseAttValueComplex function in parser.c in libxml2. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:8121
The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain implementations. Successful exploitation allows attackers to execute arbitrary co ...

oval:org.secpod.oval:def:8122
The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain implementations. Successful exploitation allows attackers to execute arbitrary co ...

oval:org.secpod.oval:def:8132
The host is installed with Google Chrome before 23.0.1271.91 and is prone to heap-based buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle the xmlParseAttValueComplex function in parser.c in libxml2. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:8103
The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain implementations. Successful exploitation allows attackers to execute arbitrary co ...

oval:org.secpod.oval:def:1300144
A vulnerability was found and corrected in libxml2: A heap-buffer overflow was found in the way libxml2 decoded certain XML entitites. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, po ...

oval:org.secpod.oval:def:202498
The libxml2 library is a development toolbox providing the implementation of various XML standards. A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked agains ...

oval:org.secpod.oval:def:701100
libxml2: GNOME XML library Applications using libxml2 could be made to crash or run programs as your login if they opened a specially crafted file.

oval:org.secpod.oval:def:15913
The host is installed with Apple iTunes before 11.1.4 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:8097
The host is installed with Google Chrome before 23.0.1271.91 and is prone to heap-based buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle the xmlParseAttValueComplex function in parser.c in libxml2. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:600921
Jueri Aedla discovered a buffer overflow in the libxml XML library, which could result in the execution of arbitrary code.

oval:org.secpod.oval:def:8107
The host is missing a high severity security update according to Google advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle certain implementations. Successful exploitation allows attackers to execute arbitrary co ...

oval:org.secpod.oval:def:8111
The host is installed with Google Chrome before 23.0.1271.91 and is prone to heap-based buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle the xmlParseAttValueComplex function in parser.c in libxml2. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:202497
The libxml2 library is a development toolbox providing the implementation of various XML standards. A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked agains ...

oval:org.secpod.oval:def:16642
The host is missing a security update according to Apple advisory, APPLE-SA-2014-01-22-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle the contents of the iTunes Tutorials window. Successful exploitation allows attac ...

oval:org.secpod.oval:def:15917
The host is missing a security update according to apple advisory, APPLE-SA-2013-10-22-8. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the ...

oval:org.secpod.oval:def:202536
These packages provide the libxml2 library, a development toolbox providing the implementation of various XML standards, for users of MinGW . IMPORTANT NOTE: The mingw32 packages in Red Hat Enterprise Linux 6 will no longer be updated proactively and will be deprecated with the release of Red Hat En ...

oval:org.secpod.oval:def:302981
A vulnerability was found and corrected in libxml2: A heap-buffer overflow was found in the way libxml2 decoded certain XML entites. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, pote ...

oval:org.secpod.oval:def:1503689
Updated libxml2 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is ava ...

oval:org.secpod.oval:def:1500076
Updated mingw32-libxml2 packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 6. This advisory also containsinformation about future updates for the mingw32 packages, as well as thedeprecation of the packages with the release of Red HatEnterprise Linux 6.4.The Red H ...

oval:org.secpod.oval:def:500928
The libxml2 library is a development toolbox providing the implementation of various XML standards. A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked agains ...

CPE    226
cpe:/a:xmlsoft:libxml2:2.3.9
cpe:/a:xmlsoft:libxml2:2.3.8
cpe:/o:apple:iphone_os:6.1.4
cpe:/o:apple:iphone_os:6.1.3
...
CWE    1
CWE-119
*CVE
CVE-2012-5134

© SecPod Technologies