[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:507068
The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix: * libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write For more details about the security issue, including the impact, a CVSS score, acknowledgments, and othe ...

oval:org.secpod.oval:def:86636
libxml2: GNOME XML library Several security issues were fixed in libxml2.

oval:org.secpod.oval:def:607778
Felix Wilhelm reported that several buffer handling functions in libxml2, a library providing support to read, modify and write XML and HTML files, don"t check for integer overflows, resulting in out-of-bounds memory writes if specially crafted, multi-gigabyte XML files are processed. An attacker ca ...

oval:org.secpod.oval:def:507054
The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix: * libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write For more details about the security issue, including the impact, a CVSS score, acknowledgments, and othe ...

oval:org.secpod.oval:def:1505806
[2.9.7-13.1] - Fix CVE-2022-29824

oval:org.secpod.oval:def:1505862
[2.9.13-1.1] - Fix CVE-2022-29824

oval:org.secpod.oval:def:1701020
A flaw was found in the libxml2 library in functions used to manipulate the xmlBuf and the xmlBuffer types. A substantial input causes values to calculate buffer sizes to overflow, resulting in an out-of-bounds write

oval:org.secpod.oval:def:122157
This library allows to manipulate XML files. It includes support to read, modify and write XML and HTML files. There is DTDs support this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream o ...

oval:org.secpod.oval:def:3300756
SUSE Security Update: Security update for libxml2

oval:org.secpod.oval:def:19500083
valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes. A flaw was found in the libxml2 library in functions used to manipulate the xmlBuf and the xmlBuffer types. A substantial input causes values to calculate buffer sizes to overflow, resulting in an out-of-bounds write. ...

oval:org.secpod.oval:def:5800120
The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix: * libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write For more details about the security issue, including the impact, a CVSS score, acknowledgments, and othe ...

oval:org.secpod.oval:def:122178
This library allows to manipulate XML files. It includes support to read, modify and write XML and HTML files. There is DTDs support this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream o ...

oval:org.secpod.oval:def:88357
Felix Wilhelm reported that several buffer handling functions in libxml2, a library providing support to read, modify and write XML and HTML files, don"t check for integer overflows, resulting in out-of-bounds memory writes if specially crafted, multi-gigabyte XML files are processed. An attacker ca ...

oval:org.secpod.oval:def:706795
libxml2: GNOME XML library Several security issues were fixed in libxml2.

oval:org.secpod.oval:def:2107801
Oracle Solaris 11 - ( CVE-2022-29824 )

oval:org.secpod.oval:def:4500961
The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix: * libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write For more details about the security issue, including the impact, a CVSS score, acknowledgments, and othe ...

oval:org.secpod.oval:def:89047608
This update for libxml2 fixes the following issues: - CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes . - CVE-2022-29824: Fixed integer overflow that could have led to an out-of-bounds write in buf.c and tree.c .

oval:org.secpod.oval:def:89046329
This update for libxml2 fixes the following issues: - CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes . - CVE-2022-29824: Fixed integer overflow that could have led to an out-of-bounds write in buf.c and tree.c .

oval:org.secpod.oval:def:3301233
SUSE Security Update: Security update for libxml2

oval:org.secpod.oval:def:89047653
This update for libxml2 fixes the following issues: Update to 2.9.14: - CVE-2022-29824: Fixed integer overflow that could have led to an out-of-bounds write in buf.c and tree.c . Update to version 2.9.13: - CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes

oval:org.secpod.oval:def:89046340
This update for libxml2 fixes the following issues: - CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c and tree.c . - CVE-2017-16932: Prevent infinite recursion in parameter entities .

oval:org.secpod.oval:def:90235
The remote host is missing a patch containing a security fix, which affects the following packages: bos.rte.control. For more information please visit vendor advisory link.

oval:org.secpod.oval:def:1601696
parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name. GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml ...

oval:org.secpod.oval:def:89048764
This update for libxml2 fixes the following issues: * CVE-2023-29469: Fixed inconsistent result when hashing empty strings . * CVE-2023-28484: Fixed NULL pointer dereference in xmlSchemaFixupComplexType . * CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c . The followin ...

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:xmlsoft:libxml2
cpe:/a:xmlsoft:libxslt
CWE    1
CWE-190
*CVE
CVE-2022-29824

© SecPod Technologies