Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xc47-x3wf-rv79

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Ссылки

EPSS

Процентиль: 88%
0.03817
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

redhat
больше 16 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

nvd
больше 16 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

debian
больше 16 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 al ...

oracle-oval
больше 16 лет назад

ELSA-2008-0988: libxml2 security update (IMPORTANT)

EPSS

Процентиль: 88%
0.03817
Низкий