Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-11210

Опубликовано: 16 мая 2018
Источник: debian
EPSS Низкий

Описание

TinyXML2 6.2.0 has a heap-based buffer over-read in the XMLDocument::Parse function in libtinyxml2.so. NOTE: The tinyxml2 developers have determined that the reported overflow is due to improper use of the library and not a vulnerability in tinyxml2

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tinyxml2unfixedpackage

Примечания

  • https://github.com/leethomason/tinyxml2/issues/675

  • Non-real issue, missuse of API

EPSS

Процентиль: 47%
0.00243
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

TinyXML2 6.2.0 has a heap-based buffer over-read in the XMLDocument::Parse function in libtinyxml2.so. NOTE: The tinyxml2 developers have determined that the reported overflow is due to improper use of the library and not a vulnerability in tinyxml2

CVSS3: 4.4
redhat
больше 7 лет назад

TinyXML2 6.2.0 has a heap-based buffer over-read in the XMLDocument::Parse function in libtinyxml2.so. NOTE: The tinyxml2 developers have determined that the reported overflow is due to improper use of the library and not a vulnerability in tinyxml2

CVSS3: 9.8
nvd
больше 7 лет назад

TinyXML2 6.2.0 has a heap-based buffer over-read in the XMLDocument::Parse function in libtinyxml2.so. NOTE: The tinyxml2 developers have determined that the reported overflow is due to improper use of the library and not a vulnerability in tinyxml2

CVSS3: 9.8
github
больше 3 лет назад

** DISPUTED ** TinyXML2 6.2.0 has a heap-based buffer over-read in the XMLDocument::Parse function in libtinyxml2.so. NOTE: The tinyxml2 developers have determined that the reported overflow is due to improper use of the library and not a vulnerability in tinyxml2.

EPSS

Процентиль: 47%
0.00243
Низкий