Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-libs/libxml2@2.7.8-r3
Typeebuild
Namespacedev-libs
Namelibxml2
Version2.7.8-r3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.7.8-r4
Latest_non_vulnerable_version2.12.5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-8pmj-m5vu-4uc2
vulnerability_id VCID-8pmj-m5vu-4uc2
summary
Multiple vulnerabilities were found in libxml2 which could lead to
    execution of arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2821.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2821.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2821
reference_id
reference_type
scores
0
value 0.01915
scoring_system epss
scoring_elements 0.83241
published_at 2026-04-01T12:55:00Z
1
value 0.01915
scoring_system epss
scoring_elements 0.83257
published_at 2026-04-02T12:55:00Z
2
value 0.01915
scoring_system epss
scoring_elements 0.83272
published_at 2026-04-04T12:55:00Z
3
value 0.01915
scoring_system epss
scoring_elements 0.83271
published_at 2026-04-07T12:55:00Z
4
value 0.01915
scoring_system epss
scoring_elements 0.83295
published_at 2026-04-08T12:55:00Z
5
value 0.01915
scoring_system epss
scoring_elements 0.83304
published_at 2026-04-09T12:55:00Z
6
value 0.01915
scoring_system epss
scoring_elements 0.83319
published_at 2026-04-11T12:55:00Z
7
value 0.01915
scoring_system epss
scoring_elements 0.83313
published_at 2026-04-12T12:55:00Z
8
value 0.01915
scoring_system epss
scoring_elements 0.83309
published_at 2026-04-13T12:55:00Z
9
value 0.01915
scoring_system epss
scoring_elements 0.83344
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2821
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2821
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643648
reference_id 643648
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643648
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=735712
reference_id 735712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=735712
5
reference_url https://security.gentoo.org/glsa/201110-26
reference_id GLSA-201110-26
reference_type
scores
url https://security.gentoo.org/glsa/201110-26
6
reference_url https://access.redhat.com/errata/RHSA-2011:1749
reference_id RHSA-2011:1749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1749
7
reference_url https://access.redhat.com/errata/RHSA-2013:0217
reference_id RHSA-2013:0217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0217
8
reference_url https://usn.ubuntu.com/1334-1/
reference_id USN-1334-1
reference_type
scores
url https://usn.ubuntu.com/1334-1/
fixed_packages
0
url pkg:ebuild/dev-libs/libxml2@2.7.8-r3
purl pkg:ebuild/dev-libs/libxml2@2.7.8-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libxml2@2.7.8-r3
aliases CVE-2011-2821
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8pmj-m5vu-4uc2
1
url VCID-axc8-mw7j-7ufg
vulnerability_id VCID-axc8-mw7j-7ufg
summary
Double Free
Double free vulnerability in libxml2 and other versions, as used in Google Chrome and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
references
0
reference_url http://code.google.com/p/chromium/issues/detail?id=63444
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=63444
1
reference_url http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html
2
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
4
reference_url http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
5
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
8
reference_url http://marc.info/?l=bugtraq&m=139447903326211&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=139447903326211&w=2
9
reference_url http://rhn.redhat.com/errata/RHSA-2013-0217.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0217.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4494.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4494.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4494
reference_id
reference_type
scores
0
value 0.01264
scoring_system epss
scoring_elements 0.79475
published_at 2026-04-16T12:55:00Z
1
value 0.01264
scoring_system epss
scoring_elements 0.79396
published_at 2026-04-01T12:55:00Z
2
value 0.01264
scoring_system epss
scoring_elements 0.79403
published_at 2026-04-02T12:55:00Z
3
value 0.01264
scoring_system epss
scoring_elements 0.79425
published_at 2026-04-04T12:55:00Z
4
value 0.01264
scoring_system epss
scoring_elements 0.79412
published_at 2026-04-07T12:55:00Z
5
value 0.01264
scoring_system epss
scoring_elements 0.7944
published_at 2026-04-08T12:55:00Z
6
value 0.01264
scoring_system epss
scoring_elements 0.79449
published_at 2026-04-09T12:55:00Z
7
value 0.01264
scoring_system epss
scoring_elements 0.79471
published_at 2026-04-11T12:55:00Z
8
value 0.01264
scoring_system epss
scoring_elements 0.79455
published_at 2026-04-12T12:55:00Z
9
value 0.01264
scoring_system epss
scoring_elements 0.79444
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4494
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494
13
reference_url http://secunia.com/advisories/40775
reference_id
reference_type
scores
url http://secunia.com/advisories/40775
14
reference_url http://secunia.com/advisories/42472
reference_id
reference_type
scores
url http://secunia.com/advisories/42472
15
reference_url http://secunia.com/advisories/42721
reference_id
reference_type
scores
url http://secunia.com/advisories/42721
16
reference_url http://secunia.com/advisories/42762
reference_id
reference_type
scores
url http://secunia.com/advisories/42762
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916
18
reference_url http://support.apple.com/kb/HT4554
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4554
19
reference_url http://support.apple.com/kb/HT4564
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4564
20
reference_url http://support.apple.com/kb/HT4566
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4566
21
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
22
reference_url http://www.debian.org/security/2010/dsa-2137
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2137
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:260
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:260
24
reference_url http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-1749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-1749.html
26
reference_url http://www.vupen.com/english/advisories/2010/3319
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3319
27
reference_url http://www.vupen.com/english/advisories/2010/3336
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3336
28
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
29
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607922
reference_id 607922
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607922
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=665963
reference_id 665963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=665963
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:insight_control_server_deployment:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:insight_control_server_deployment:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:insight_control_server_deployment:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:rapid_deployment_pack:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:rapid_deployment_pack:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:rapid_deployment_pack:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4494
reference_id CVE-2010-4494
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4494
51
reference_url https://security.gentoo.org/glsa/201110-26
reference_id GLSA-201110-26
reference_type
scores
url https://security.gentoo.org/glsa/201110-26
52
reference_url https://access.redhat.com/errata/RHSA-2011:1749
reference_id RHSA-2011:1749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1749
53
reference_url https://access.redhat.com/errata/RHSA-2013:0217
reference_id RHSA-2013:0217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0217
fixed_packages
0
url pkg:ebuild/dev-libs/libxml2@2.7.8-r3
purl pkg:ebuild/dev-libs/libxml2@2.7.8-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libxml2@2.7.8-r3
aliases CVE-2010-4494
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axc8-mw7j-7ufg
2
url VCID-hz3p-4d8c-z7gm
vulnerability_id VCID-hz3p-4d8c-z7gm
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
libxml2, as used in Google Chrome, Apple Safari, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
references
0
reference_url http://blog.bkis.com/en/libxml2-vulnerability-in-google-chrome-and-apple-safari/
reference_id
reference_type
scores
url http://blog.bkis.com/en/libxml2-vulnerability-in-google-chrome-and-apple-safari/
1
reference_url http://code.google.com/p/chromium/issues/detail?id=58731
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=58731
2
reference_url http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
5
reference_url http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
6
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
8
reference_url http://mail.gnome.org/archives/xml/2010-November/msg00015.html
reference_id
reference_type
scores
url http://mail.gnome.org/archives/xml/2010-November/msg00015.html
9
reference_url http://marc.info/?l=bugtraq&m=130331363227777&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130331363227777&w=2
10
reference_url http://marc.info/?l=bugtraq&m=139447903326211&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=139447903326211&w=2
11
reference_url http://rhn.redhat.com/errata/RHSA-2013-0217.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0217.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4008.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4008.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4008
reference_id
reference_type
scores
0
value 0.00756
scoring_system epss
scoring_elements 0.73304
published_at 2026-04-16T12:55:00Z
1
value 0.00756
scoring_system epss
scoring_elements 0.73209
published_at 2026-04-01T12:55:00Z
2
value 0.00756
scoring_system epss
scoring_elements 0.73219
published_at 2026-04-02T12:55:00Z
3
value 0.00756
scoring_system epss
scoring_elements 0.7324
published_at 2026-04-04T12:55:00Z
4
value 0.00756
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-07T12:55:00Z
5
value 0.00756
scoring_system epss
scoring_elements 0.73249
published_at 2026-04-08T12:55:00Z
6
value 0.00756
scoring_system epss
scoring_elements 0.73263
published_at 2026-04-09T12:55:00Z
7
value 0.00756
scoring_system epss
scoring_elements 0.73288
published_at 2026-04-11T12:55:00Z
8
value 0.00756
scoring_system epss
scoring_elements 0.73268
published_at 2026-04-12T12:55:00Z
9
value 0.00756
scoring_system epss
scoring_elements 0.73261
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4008
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008
15
reference_url http://secunia.com/advisories/40775
reference_id
reference_type
scores
url http://secunia.com/advisories/40775
16
reference_url http://secunia.com/advisories/42109
reference_id
reference_type
scores
url http://secunia.com/advisories/42109
17
reference_url http://secunia.com/advisories/42175
reference_id
reference_type
scores
url http://secunia.com/advisories/42175
18
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
19
reference_url http://secunia.com/advisories/42429
reference_id
reference_type
scores
url http://secunia.com/advisories/42429
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12148
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12148
21
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
22
reference_url http://support.apple.com/kb/HT4554
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4554
23
reference_url http://support.apple.com/kb/HT4566
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4566
24
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
25
reference_url http://www.debian.org/security/2010/dsa-2128
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2128
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:243
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:243
27
reference_url http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2011-1749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-1749.html
29
reference_url http://www.securityfocus.com/bid/44779
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44779
30
reference_url http://www.ubuntu.com/usn/USN-1016-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1016-1
31
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
32
reference_url http://www.vupen.com/english/advisories/2010/3076
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3076
33
reference_url http://www.vupen.com/english/advisories/2010/3100
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3100
34
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
35
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602609
reference_id 602609
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602609
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645341
reference_id 645341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645341
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp3:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4008
reference_id CVE-2010-4008
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4008
62
reference_url https://security.gentoo.org/glsa/201110-26
reference_id GLSA-201110-26
reference_type
scores
url https://security.gentoo.org/glsa/201110-26
63
reference_url https://access.redhat.com/errata/RHSA-2011:1749
reference_id RHSA-2011:1749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1749
64
reference_url https://access.redhat.com/errata/RHSA-2012:0017
reference_id RHSA-2012:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0017
65
reference_url https://access.redhat.com/errata/RHSA-2013:0217
reference_id RHSA-2013:0217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0217
66
reference_url https://usn.ubuntu.com/1016-1/
reference_id USN-1016-1
reference_type
scores
url https://usn.ubuntu.com/1016-1/
fixed_packages
0
url pkg:ebuild/dev-libs/libxml2@2.7.8-r3
purl pkg:ebuild/dev-libs/libxml2@2.7.8-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libxml2@2.7.8-r3
aliases CVE-2010-4008
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hz3p-4d8c-z7gm
3
url VCID-js7v-8a5j-h7ba
vulnerability_id VCID-js7v-8a5j-h7ba
summary
Multiple vulnerabilities have been reported in Chromium and V8,
    some of which may allow execution of arbitrary code and local root
    privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2834.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2834
reference_id
reference_type
scores
0
value 0.029
scoring_system epss
scoring_elements 0.86288
published_at 2026-04-01T12:55:00Z
1
value 0.029
scoring_system epss
scoring_elements 0.86298
published_at 2026-04-02T12:55:00Z
2
value 0.029
scoring_system epss
scoring_elements 0.86316
published_at 2026-04-04T12:55:00Z
3
value 0.029
scoring_system epss
scoring_elements 0.86317
published_at 2026-04-07T12:55:00Z
4
value 0.029
scoring_system epss
scoring_elements 0.86335
published_at 2026-04-08T12:55:00Z
5
value 0.029
scoring_system epss
scoring_elements 0.86345
published_at 2026-04-09T12:55:00Z
6
value 0.029
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-11T12:55:00Z
7
value 0.029
scoring_system epss
scoring_elements 0.86357
published_at 2026-04-12T12:55:00Z
8
value 0.029
scoring_system epss
scoring_elements 0.86352
published_at 2026-04-13T12:55:00Z
9
value 0.029
scoring_system epss
scoring_elements 0.86368
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2834
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643648
reference_id 643648
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643648
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=735751
reference_id 735751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=735751
5
reference_url https://security.gentoo.org/glsa/201110-26
reference_id GLSA-201110-26
reference_type
scores
url https://security.gentoo.org/glsa/201110-26
6
reference_url https://security.gentoo.org/glsa/201111-01
reference_id GLSA-201111-01
reference_type
scores
url https://security.gentoo.org/glsa/201111-01
7
reference_url https://access.redhat.com/errata/RHSA-2011:1749
reference_id RHSA-2011:1749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1749
8
reference_url https://access.redhat.com/errata/RHSA-2012:0016
reference_id RHSA-2012:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0016
9
reference_url https://access.redhat.com/errata/RHSA-2012:0017
reference_id RHSA-2012:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0017
10
reference_url https://access.redhat.com/errata/RHSA-2013:0217
reference_id RHSA-2013:0217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0217
11
reference_url https://usn.ubuntu.com/1334-1/
reference_id USN-1334-1
reference_type
scores
url https://usn.ubuntu.com/1334-1/
fixed_packages
0
url pkg:ebuild/dev-libs/libxml2@2.7.8-r3
purl pkg:ebuild/dev-libs/libxml2@2.7.8-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libxml2@2.7.8-r3
aliases CVE-2011-2834
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-js7v-8a5j-h7ba
4
url VCID-ttud-e3xr-dudd
vulnerability_id VCID-ttud-e3xr-dudd
summary
Integer Overflow
Integer overflow in xpath.c in libxml2, and libxml, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1944.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1944.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1944
reference_id
reference_type
scores
0
value 0.23686
scoring_system epss
scoring_elements 0.9596
published_at 2026-04-01T12:55:00Z
1
value 0.23686
scoring_system epss
scoring_elements 0.95967
published_at 2026-04-02T12:55:00Z
2
value 0.23686
scoring_system epss
scoring_elements 0.95974
published_at 2026-04-04T12:55:00Z
3
value 0.23686
scoring_system epss
scoring_elements 0.95979
published_at 2026-04-07T12:55:00Z
4
value 0.23686
scoring_system epss
scoring_elements 0.95988
published_at 2026-04-08T12:55:00Z
5
value 0.23686
scoring_system epss
scoring_elements 0.9599
published_at 2026-04-09T12:55:00Z
6
value 0.23686
scoring_system epss
scoring_elements 0.95993
published_at 2026-04-12T12:55:00Z
7
value 0.23686
scoring_system epss
scoring_elements 0.95996
published_at 2026-04-13T12:55:00Z
8
value 0.23686
scoring_system epss
scoring_elements 0.96005
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1944
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628537
reference_id 628537
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628537
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=709747
reference_id 709747
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=709747
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1944
reference_id CVE-2011-1944
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2011-1944
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35810.txt
reference_id CVE-2011-1944;OSVDB-73248
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35810.txt
7
reference_url https://www.securityfocus.com/bid/48056/info
reference_id CVE-2011-1944;OSVDB-73248
reference_type exploit
scores
url https://www.securityfocus.com/bid/48056/info
8
reference_url https://security.gentoo.org/glsa/201110-26
reference_id GLSA-201110-26
reference_type
scores
url https://security.gentoo.org/glsa/201110-26
9
reference_url https://access.redhat.com/errata/RHSA-2011:1749
reference_id RHSA-2011:1749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1749
10
reference_url https://access.redhat.com/errata/RHSA-2012:0017
reference_id RHSA-2012:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0017
11
reference_url https://access.redhat.com/errata/RHSA-2013:0217
reference_id RHSA-2013:0217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0217
12
reference_url https://usn.ubuntu.com/1153-1/
reference_id USN-1153-1
reference_type
scores
url https://usn.ubuntu.com/1153-1/
fixed_packages
0
url pkg:ebuild/dev-libs/libxml2@2.7.8-r3
purl pkg:ebuild/dev-libs/libxml2@2.7.8-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libxml2@2.7.8-r3
aliases CVE-2011-1944
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttud-e3xr-dudd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libxml2@2.7.8-r3