Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-h6qs-dgys-afes
Summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2, as used in Google Chrome and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
Aliases
0
alias CVE-2012-5134
Fixed_packages
0
url pkg:deb/debian/libxml2@2.8.0%2Bdfsg1-7?distro=trixie
purl pkg:deb/debian/libxml2@2.8.0%2Bdfsg1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.8.0%252Bdfsg1-7%3Fdistro=trixie
1
url pkg:deb/debian/libxml2@2.8.0%2Bdfsg1-7%2Bwheezy5
purl pkg:deb/debian/libxml2@2.8.0%2Bdfsg1-7%2Bwheezy5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-27jd-t23h-73f4
1
vulnerability VCID-2b1g-gp84-87e8
2
vulnerability VCID-2j62-5rjn-vyeu
3
vulnerability VCID-31w8-13b6-8beh
4
vulnerability VCID-33n1-125n-63h6
5
vulnerability VCID-3d1e-enaq-q3cx
6
vulnerability VCID-3s4n-twju-b3dw
7
vulnerability VCID-3whx-6t3e-7beq
8
vulnerability VCID-464a-typa-7qbu
9
vulnerability VCID-4hws-gtxr-3bge
10
vulnerability VCID-4m3j-qy8c-4uhk
11
vulnerability VCID-51f2-w9b7-9fb4
12
vulnerability VCID-57yv-ay7b-v7ev
13
vulnerability VCID-69ff-ngna-mkbv
14
vulnerability VCID-6h9f-6pmg-3fh3
15
vulnerability VCID-74y5-vcxn-2ygr
16
vulnerability VCID-782a-uast-nbch
17
vulnerability VCID-7bpp-2hvk-2udv
18
vulnerability VCID-7h3p-7ej2-17f1
19
vulnerability VCID-7rzw-9jj5-4ybk
20
vulnerability VCID-8d2w-3c3p-zqaz
21
vulnerability VCID-8tej-h12t-2fag
22
vulnerability VCID-9hqf-12yh-bkc8
23
vulnerability VCID-9p2f-ynzb-r3gj
24
vulnerability VCID-9q49-2srz-rkg7
25
vulnerability VCID-aasn-u7fd-8bhy
26
vulnerability VCID-ah8e-sxuu-jqcw
27
vulnerability VCID-ahha-vnq4-7qd2
28
vulnerability VCID-azzy-m5pc-qudn
29
vulnerability VCID-b5tz-9s1v-pkg7
30
vulnerability VCID-bejh-22y7-kuh6
31
vulnerability VCID-bk98-bfkg-7bdt
32
vulnerability VCID-bp8r-8jjt-hygw
33
vulnerability VCID-bz1e-1ypb-kkgg
34
vulnerability VCID-c9ds-faa9-t7be
35
vulnerability VCID-cbm2-cez4-bqgh
36
vulnerability VCID-cgfv-pps6-6khd
37
vulnerability VCID-d68t-f8j1-h3am
38
vulnerability VCID-drkd-yykc-ayge
39
vulnerability VCID-e9c3-5gws-u3fp
40
vulnerability VCID-eb6k-ppfd-m7a3
41
vulnerability VCID-ecde-c15q-ukh1
42
vulnerability VCID-eebz-xjem-cygz
43
vulnerability VCID-ek5d-m9pn-3fec
44
vulnerability VCID-ghaf-ynsg-uuea
45
vulnerability VCID-gvmn-4dtv-8qcj
46
vulnerability VCID-gxsm-qvkt-gygy
47
vulnerability VCID-hafa-bcpu-8uaj
48
vulnerability VCID-ked7-5tjg-nudx
49
vulnerability VCID-mhwv-kcxp-buc7
50
vulnerability VCID-mm88-amve-quh6
51
vulnerability VCID-netm-9gxh-3yh4
52
vulnerability VCID-nrut-syek-s7fg
53
vulnerability VCID-nuh8-qd25-ykan
54
vulnerability VCID-pdv9-xrh8-d3fz
55
vulnerability VCID-qh44-gavt-rbdw
56
vulnerability VCID-qp6y-dt1j-97df
57
vulnerability VCID-qpnt-xvgv-s3cq
58
vulnerability VCID-qqte-z1e6-xuh7
59
vulnerability VCID-qtp3-a1g7-8kgw
60
vulnerability VCID-qv3r-ppuc-zycz
61
vulnerability VCID-qxwq-xwaw-nyak
62
vulnerability VCID-r7q9-7u4b-83cz
63
vulnerability VCID-rhgj-t5cp-wkbh
64
vulnerability VCID-rsvx-3f49-v3an
65
vulnerability VCID-s3j9-1zq5-zkf5
66
vulnerability VCID-s9r4-a3uz-4yhp
67
vulnerability VCID-t53m-6vvr-27cf
68
vulnerability VCID-t9pa-yw9s-kqb9
69
vulnerability VCID-tazr-2qgq-77fy
70
vulnerability VCID-tn87-vke6-kuf6
71
vulnerability VCID-tyk2-gq2c-bbcn
72
vulnerability VCID-udew-3gre-13hy
73
vulnerability VCID-ugyh-dycm-3bc3
74
vulnerability VCID-vcq9-93xd-nfbe
75
vulnerability VCID-vf7b-s3y3-sfhw
76
vulnerability VCID-wc4g-sxyq-ubcd
77
vulnerability VCID-wj66-7n6c-9kam
78
vulnerability VCID-wtxh-xxp2-d3hr
79
vulnerability VCID-wy5v-dsp3-a7aa
80
vulnerability VCID-x9ej-7dcq-tub2
81
vulnerability VCID-xps8-1a3r-wke6
82
vulnerability VCID-ymhr-ads4-qqdp
83
vulnerability VCID-zm21-2pqq-3ker
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.8.0%252Bdfsg1-7%252Bwheezy5
2
url pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/libxml2@2.9.10%2Bdfsg-6.7%2Bdeb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.10%252Bdfsg-6.7%252Bdeb11u4%3Fdistro=trixie
3
url pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5?distro=trixie
purl pkg:deb/debian/libxml2@2.9.14%2Bdfsg-1.3~deb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.9.14%252Bdfsg-1.3~deb12u5%3Fdistro=trixie
4
url pkg:deb/debian/libxml2@2.12.7%2Bdfsg%2Breally2.9.14-2.1%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/libxml2@2.12.7%2Bdfsg%2Breally2.9.14-2.1%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-62bb-e8vk-7uh4
1
vulnerability VCID-d1ar-1945-sygd
2
vulnerability VCID-knx8-5fpz-zbgn
3
vulnerability VCID-nj3a-zqw9-6bga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.12.7%252Bdfsg%252Breally2.9.14-2.1%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/libxml2@2.15.2%2Bdfsg-0.1?distro=trixie
purl pkg:deb/debian/libxml2@2.15.2%2Bdfsg-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.15.2%252Bdfsg-0.1%3Fdistro=trixie
6
url pkg:ebuild/dev-libs/libxml2@2.9.1-r1
purl pkg:ebuild/dev-libs/libxml2@2.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libxml2@2.9.1-r1
7
url pkg:nuget/libxml2@2.7.8.2
purl pkg:nuget/libxml2@2.7.8.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2b1g-gp84-87e8
1
vulnerability VCID-2j62-5rjn-vyeu
2
vulnerability VCID-33n1-125n-63h6
3
vulnerability VCID-3d1e-enaq-q3cx
4
vulnerability VCID-4hws-gtxr-3bge
5
vulnerability VCID-51f2-w9b7-9fb4
6
vulnerability VCID-57yv-ay7b-v7ev
7
vulnerability VCID-7h3p-7ej2-17f1
8
vulnerability VCID-7rzw-9jj5-4ybk
9
vulnerability VCID-8tej-h12t-2fag
10
vulnerability VCID-9hqf-12yh-bkc8
11
vulnerability VCID-9p2f-ynzb-r3gj
12
vulnerability VCID-9q49-2srz-rkg7
13
vulnerability VCID-aasn-u7fd-8bhy
14
vulnerability VCID-ah8e-sxuu-jqcw
15
vulnerability VCID-azzy-m5pc-qudn
16
vulnerability VCID-b828-btkm-tufv
17
vulnerability VCID-bejh-22y7-kuh6
18
vulnerability VCID-bk98-bfkg-7bdt
19
vulnerability VCID-cbm2-cez4-bqgh
20
vulnerability VCID-cgfv-pps6-6khd
21
vulnerability VCID-e9c3-5gws-u3fp
22
vulnerability VCID-eb6k-ppfd-m7a3
23
vulnerability VCID-ecde-c15q-ukh1
24
vulnerability VCID-eebz-xjem-cygz
25
vulnerability VCID-ek5d-m9pn-3fec
26
vulnerability VCID-gc1r-nauj-1fge
27
vulnerability VCID-ghaf-ynsg-uuea
28
vulnerability VCID-gvmn-4dtv-8qcj
29
vulnerability VCID-gxsm-qvkt-gygy
30
vulnerability VCID-ked7-5tjg-nudx
31
vulnerability VCID-netm-9gxh-3yh4
32
vulnerability VCID-qtp3-a1g7-8kgw
33
vulnerability VCID-r7q9-7u4b-83cz
34
vulnerability VCID-rsvx-3f49-v3an
35
vulnerability VCID-s3j9-1zq5-zkf5
36
vulnerability VCID-s9r4-a3uz-4yhp
37
vulnerability VCID-t9pa-yw9s-kqb9
38
vulnerability VCID-tazr-2qgq-77fy
39
vulnerability VCID-tn87-vke6-kuf6
40
vulnerability VCID-tyk2-gq2c-bbcn
41
vulnerability VCID-udew-3gre-13hy
42
vulnerability VCID-ugyh-dycm-3bc3
43
vulnerability VCID-vcq9-93xd-nfbe
44
vulnerability VCID-vf7b-s3y3-sfhw
45
vulnerability VCID-wc4g-sxyq-ubcd
46
vulnerability VCID-wksj-tx4y-cye7
47
vulnerability VCID-wy5v-dsp3-a7aa
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libxml2@2.7.8.2
Affected_packages
0
url pkg:deb/debian/libxml2@2.4.19-4woody2
purl pkg:deb/debian/libxml2@2.4.19-4woody2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1d83-bsv8-ckhz
1
vulnerability VCID-27jd-t23h-73f4
2
vulnerability VCID-2b1g-gp84-87e8
3
vulnerability VCID-2j62-5rjn-vyeu
4
vulnerability VCID-2r5u-7wpy-4yf9
5
vulnerability VCID-31w8-13b6-8beh
6
vulnerability VCID-33n1-125n-63h6
7
vulnerability VCID-3d1e-enaq-q3cx
8
vulnerability VCID-3s4n-twju-b3dw
9
vulnerability VCID-3whx-6t3e-7beq
10
vulnerability VCID-464a-typa-7qbu
11
vulnerability VCID-4hws-gtxr-3bge
12
vulnerability VCID-4m3j-qy8c-4uhk
13
vulnerability VCID-51f2-w9b7-9fb4
14
vulnerability VCID-57yv-ay7b-v7ev
15
vulnerability VCID-5j6d-yzbn-h3ha
16
vulnerability VCID-62te-7sds-wbbh
17
vulnerability VCID-69ff-ngna-mkbv
18
vulnerability VCID-6h9f-6pmg-3fh3
19
vulnerability VCID-74y5-vcxn-2ygr
20
vulnerability VCID-782a-uast-nbch
21
vulnerability VCID-7bpp-2hvk-2udv
22
vulnerability VCID-7f2n-978e-dkh5
23
vulnerability VCID-7h3p-7ej2-17f1
24
vulnerability VCID-7rzw-9jj5-4ybk
25
vulnerability VCID-86mu-krba-a3e9
26
vulnerability VCID-8d2w-3c3p-zqaz
27
vulnerability VCID-8pmj-m5vu-4uc2
28
vulnerability VCID-8tej-h12t-2fag
29
vulnerability VCID-9hqf-12yh-bkc8
30
vulnerability VCID-9p2f-ynzb-r3gj
31
vulnerability VCID-9q49-2srz-rkg7
32
vulnerability VCID-aasn-u7fd-8bhy
33
vulnerability VCID-ah8e-sxuu-jqcw
34
vulnerability VCID-ahha-vnq4-7qd2
35
vulnerability VCID-axc8-mw7j-7ufg
36
vulnerability VCID-ayqh-mrmn-tqgg
37
vulnerability VCID-azzy-m5pc-qudn
38
vulnerability VCID-b4bz-7ttk-d3ae
39
vulnerability VCID-b5tz-9s1v-pkg7
40
vulnerability VCID-bejh-22y7-kuh6
41
vulnerability VCID-bk98-bfkg-7bdt
42
vulnerability VCID-bp8r-8jjt-hygw
43
vulnerability VCID-bz1e-1ypb-kkgg
44
vulnerability VCID-c9ds-faa9-t7be
45
vulnerability VCID-cbm2-cez4-bqgh
46
vulnerability VCID-cgfv-pps6-6khd
47
vulnerability VCID-d68t-f8j1-h3am
48
vulnerability VCID-drkd-yykc-ayge
49
vulnerability VCID-dzxg-zych-1yd1
50
vulnerability VCID-e9c3-5gws-u3fp
51
vulnerability VCID-eb6k-ppfd-m7a3
52
vulnerability VCID-ecde-c15q-ukh1
53
vulnerability VCID-eebz-xjem-cygz
54
vulnerability VCID-ek5d-m9pn-3fec
55
vulnerability VCID-f42v-7nvu-v7cw
56
vulnerability VCID-fc6w-68hw-4kfx
57
vulnerability VCID-frd7-r2rj-s7c7
58
vulnerability VCID-ghaf-ynsg-uuea
59
vulnerability VCID-gvmn-4dtv-8qcj
60
vulnerability VCID-gxsm-qvkt-gygy
61
vulnerability VCID-h6qs-dgys-afes
62
vulnerability VCID-hafa-bcpu-8uaj
63
vulnerability VCID-hz3p-4d8c-z7gm
64
vulnerability VCID-js7v-8a5j-h7ba
65
vulnerability VCID-ked7-5tjg-nudx
66
vulnerability VCID-mhwv-kcxp-buc7
67
vulnerability VCID-mm88-amve-quh6
68
vulnerability VCID-mvjk-gp4c-f7h8
69
vulnerability VCID-netm-9gxh-3yh4
70
vulnerability VCID-nrut-syek-s7fg
71
vulnerability VCID-nuev-71ra-ffcc
72
vulnerability VCID-nuh8-qd25-ykan
73
vulnerability VCID-pdv9-xrh8-d3fz
74
vulnerability VCID-qh44-gavt-rbdw
75
vulnerability VCID-qp6y-dt1j-97df
76
vulnerability VCID-qpnt-xvgv-s3cq
77
vulnerability VCID-qqte-z1e6-xuh7
78
vulnerability VCID-qtp3-a1g7-8kgw
79
vulnerability VCID-qv3r-ppuc-zycz
80
vulnerability VCID-qxwq-xwaw-nyak
81
vulnerability VCID-r7q9-7u4b-83cz
82
vulnerability VCID-rhgj-t5cp-wkbh
83
vulnerability VCID-rsvx-3f49-v3an
84
vulnerability VCID-s3j9-1zq5-zkf5
85
vulnerability VCID-s9r4-a3uz-4yhp
86
vulnerability VCID-t53m-6vvr-27cf
87
vulnerability VCID-t9pa-yw9s-kqb9
88
vulnerability VCID-tazr-2qgq-77fy
89
vulnerability VCID-tn87-vke6-kuf6
90
vulnerability VCID-ttud-e3xr-dudd
91
vulnerability VCID-tyk2-gq2c-bbcn
92
vulnerability VCID-udew-3gre-13hy
93
vulnerability VCID-ugyh-dycm-3bc3
94
vulnerability VCID-vcq9-93xd-nfbe
95
vulnerability VCID-vf7b-s3y3-sfhw
96
vulnerability VCID-wc4g-sxyq-ubcd
97
vulnerability VCID-wj66-7n6c-9kam
98
vulnerability VCID-wtxh-xxp2-d3hr
99
vulnerability VCID-wy5v-dsp3-a7aa
100
vulnerability VCID-x9ej-7dcq-tub2
101
vulnerability VCID-xps8-1a3r-wke6
102
vulnerability VCID-xzhu-mq3f-3bd1
103
vulnerability VCID-yj1q-xst4-y7eb
104
vulnerability VCID-ymhr-ads4-qqdp
105
vulnerability VCID-yytk-k1y3-p3hp
106
vulnerability VCID-z8ds-n38f-2uby
107
vulnerability VCID-zm21-2pqq-3ker
108
vulnerability VCID-zz7k-hf7j-qff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.4.19-4woody2
1
url pkg:deb/debian/libxml2@2.6.16-7sarge1
purl pkg:deb/debian/libxml2@2.6.16-7sarge1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1d83-bsv8-ckhz
1
vulnerability VCID-27jd-t23h-73f4
2
vulnerability VCID-2b1g-gp84-87e8
3
vulnerability VCID-2j62-5rjn-vyeu
4
vulnerability VCID-2r5u-7wpy-4yf9
5
vulnerability VCID-31w8-13b6-8beh
6
vulnerability VCID-33n1-125n-63h6
7
vulnerability VCID-3d1e-enaq-q3cx
8
vulnerability VCID-3s4n-twju-b3dw
9
vulnerability VCID-3whx-6t3e-7beq
10
vulnerability VCID-464a-typa-7qbu
11
vulnerability VCID-4hws-gtxr-3bge
12
vulnerability VCID-4m3j-qy8c-4uhk
13
vulnerability VCID-51f2-w9b7-9fb4
14
vulnerability VCID-57yv-ay7b-v7ev
15
vulnerability VCID-5j6d-yzbn-h3ha
16
vulnerability VCID-62te-7sds-wbbh
17
vulnerability VCID-69ff-ngna-mkbv
18
vulnerability VCID-6h9f-6pmg-3fh3
19
vulnerability VCID-74y5-vcxn-2ygr
20
vulnerability VCID-782a-uast-nbch
21
vulnerability VCID-7bpp-2hvk-2udv
22
vulnerability VCID-7f2n-978e-dkh5
23
vulnerability VCID-7h3p-7ej2-17f1
24
vulnerability VCID-7rzw-9jj5-4ybk
25
vulnerability VCID-86mu-krba-a3e9
26
vulnerability VCID-8d2w-3c3p-zqaz
27
vulnerability VCID-8pmj-m5vu-4uc2
28
vulnerability VCID-8tej-h12t-2fag
29
vulnerability VCID-9hqf-12yh-bkc8
30
vulnerability VCID-9p2f-ynzb-r3gj
31
vulnerability VCID-9q49-2srz-rkg7
32
vulnerability VCID-aasn-u7fd-8bhy
33
vulnerability VCID-ah8e-sxuu-jqcw
34
vulnerability VCID-ahha-vnq4-7qd2
35
vulnerability VCID-axc8-mw7j-7ufg
36
vulnerability VCID-ayqh-mrmn-tqgg
37
vulnerability VCID-azzy-m5pc-qudn
38
vulnerability VCID-b4bz-7ttk-d3ae
39
vulnerability VCID-b5tz-9s1v-pkg7
40
vulnerability VCID-bejh-22y7-kuh6
41
vulnerability VCID-bk98-bfkg-7bdt
42
vulnerability VCID-bp8r-8jjt-hygw
43
vulnerability VCID-bz1e-1ypb-kkgg
44
vulnerability VCID-c9ds-faa9-t7be
45
vulnerability VCID-cbm2-cez4-bqgh
46
vulnerability VCID-cgfv-pps6-6khd
47
vulnerability VCID-d68t-f8j1-h3am
48
vulnerability VCID-drkd-yykc-ayge
49
vulnerability VCID-dzxg-zych-1yd1
50
vulnerability VCID-e9c3-5gws-u3fp
51
vulnerability VCID-eb6k-ppfd-m7a3
52
vulnerability VCID-ecde-c15q-ukh1
53
vulnerability VCID-eebz-xjem-cygz
54
vulnerability VCID-ek5d-m9pn-3fec
55
vulnerability VCID-fc6w-68hw-4kfx
56
vulnerability VCID-frd7-r2rj-s7c7
57
vulnerability VCID-ghaf-ynsg-uuea
58
vulnerability VCID-gvmn-4dtv-8qcj
59
vulnerability VCID-gxsm-qvkt-gygy
60
vulnerability VCID-h6qs-dgys-afes
61
vulnerability VCID-hafa-bcpu-8uaj
62
vulnerability VCID-hz3p-4d8c-z7gm
63
vulnerability VCID-js7v-8a5j-h7ba
64
vulnerability VCID-ked7-5tjg-nudx
65
vulnerability VCID-mhwv-kcxp-buc7
66
vulnerability VCID-mm88-amve-quh6
67
vulnerability VCID-mvjk-gp4c-f7h8
68
vulnerability VCID-netm-9gxh-3yh4
69
vulnerability VCID-nrut-syek-s7fg
70
vulnerability VCID-nuh8-qd25-ykan
71
vulnerability VCID-pdv9-xrh8-d3fz
72
vulnerability VCID-qh44-gavt-rbdw
73
vulnerability VCID-qp6y-dt1j-97df
74
vulnerability VCID-qpnt-xvgv-s3cq
75
vulnerability VCID-qqte-z1e6-xuh7
76
vulnerability VCID-qtp3-a1g7-8kgw
77
vulnerability VCID-qv3r-ppuc-zycz
78
vulnerability VCID-qxwq-xwaw-nyak
79
vulnerability VCID-r7q9-7u4b-83cz
80
vulnerability VCID-rhgj-t5cp-wkbh
81
vulnerability VCID-rsvx-3f49-v3an
82
vulnerability VCID-s3j9-1zq5-zkf5
83
vulnerability VCID-s9r4-a3uz-4yhp
84
vulnerability VCID-t53m-6vvr-27cf
85
vulnerability VCID-t9pa-yw9s-kqb9
86
vulnerability VCID-tazr-2qgq-77fy
87
vulnerability VCID-tn87-vke6-kuf6
88
vulnerability VCID-ttud-e3xr-dudd
89
vulnerability VCID-tyk2-gq2c-bbcn
90
vulnerability VCID-udew-3gre-13hy
91
vulnerability VCID-ugyh-dycm-3bc3
92
vulnerability VCID-vcq9-93xd-nfbe
93
vulnerability VCID-vf7b-s3y3-sfhw
94
vulnerability VCID-wc4g-sxyq-ubcd
95
vulnerability VCID-wj66-7n6c-9kam
96
vulnerability VCID-wtxh-xxp2-d3hr
97
vulnerability VCID-wy5v-dsp3-a7aa
98
vulnerability VCID-x9ej-7dcq-tub2
99
vulnerability VCID-xps8-1a3r-wke6
100
vulnerability VCID-xzhu-mq3f-3bd1
101
vulnerability VCID-yj1q-xst4-y7eb
102
vulnerability VCID-ymhr-ads4-qqdp
103
vulnerability VCID-yytk-k1y3-p3hp
104
vulnerability VCID-z8ds-n38f-2uby
105
vulnerability VCID-zm21-2pqq-3ker
106
vulnerability VCID-zz7k-hf7j-qff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.6.16-7sarge1
2
url pkg:deb/debian/libxml2@2.6.27.dfsg-1
purl pkg:deb/debian/libxml2@2.6.27.dfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1d83-bsv8-ckhz
1
vulnerability VCID-27jd-t23h-73f4
2
vulnerability VCID-2b1g-gp84-87e8
3
vulnerability VCID-2j62-5rjn-vyeu
4
vulnerability VCID-2r5u-7wpy-4yf9
5
vulnerability VCID-31w8-13b6-8beh
6
vulnerability VCID-33n1-125n-63h6
7
vulnerability VCID-3d1e-enaq-q3cx
8
vulnerability VCID-3s4n-twju-b3dw
9
vulnerability VCID-3whx-6t3e-7beq
10
vulnerability VCID-464a-typa-7qbu
11
vulnerability VCID-4hws-gtxr-3bge
12
vulnerability VCID-4m3j-qy8c-4uhk
13
vulnerability VCID-51f2-w9b7-9fb4
14
vulnerability VCID-57yv-ay7b-v7ev
15
vulnerability VCID-5j6d-yzbn-h3ha
16
vulnerability VCID-62te-7sds-wbbh
17
vulnerability VCID-69ff-ngna-mkbv
18
vulnerability VCID-6h9f-6pmg-3fh3
19
vulnerability VCID-74y5-vcxn-2ygr
20
vulnerability VCID-782a-uast-nbch
21
vulnerability VCID-7bpp-2hvk-2udv
22
vulnerability VCID-7f2n-978e-dkh5
23
vulnerability VCID-7h3p-7ej2-17f1
24
vulnerability VCID-7rzw-9jj5-4ybk
25
vulnerability VCID-86mu-krba-a3e9
26
vulnerability VCID-8d2w-3c3p-zqaz
27
vulnerability VCID-8pmj-m5vu-4uc2
28
vulnerability VCID-8tej-h12t-2fag
29
vulnerability VCID-9hqf-12yh-bkc8
30
vulnerability VCID-9p2f-ynzb-r3gj
31
vulnerability VCID-9q49-2srz-rkg7
32
vulnerability VCID-aasn-u7fd-8bhy
33
vulnerability VCID-ah8e-sxuu-jqcw
34
vulnerability VCID-ahha-vnq4-7qd2
35
vulnerability VCID-axc8-mw7j-7ufg
36
vulnerability VCID-ayqh-mrmn-tqgg
37
vulnerability VCID-azzy-m5pc-qudn
38
vulnerability VCID-b4bz-7ttk-d3ae
39
vulnerability VCID-b5tz-9s1v-pkg7
40
vulnerability VCID-bejh-22y7-kuh6
41
vulnerability VCID-bk98-bfkg-7bdt
42
vulnerability VCID-bp8r-8jjt-hygw
43
vulnerability VCID-bz1e-1ypb-kkgg
44
vulnerability VCID-c9ds-faa9-t7be
45
vulnerability VCID-cbm2-cez4-bqgh
46
vulnerability VCID-cgfv-pps6-6khd
47
vulnerability VCID-d68t-f8j1-h3am
48
vulnerability VCID-drkd-yykc-ayge
49
vulnerability VCID-dzxg-zych-1yd1
50
vulnerability VCID-e9c3-5gws-u3fp
51
vulnerability VCID-eb6k-ppfd-m7a3
52
vulnerability VCID-ecde-c15q-ukh1
53
vulnerability VCID-eebz-xjem-cygz
54
vulnerability VCID-ek5d-m9pn-3fec
55
vulnerability VCID-fc6w-68hw-4kfx
56
vulnerability VCID-frd7-r2rj-s7c7
57
vulnerability VCID-ghaf-ynsg-uuea
58
vulnerability VCID-gvmn-4dtv-8qcj
59
vulnerability VCID-gxsm-qvkt-gygy
60
vulnerability VCID-h6qs-dgys-afes
61
vulnerability VCID-hafa-bcpu-8uaj
62
vulnerability VCID-hz3p-4d8c-z7gm
63
vulnerability VCID-js7v-8a5j-h7ba
64
vulnerability VCID-ked7-5tjg-nudx
65
vulnerability VCID-mhwv-kcxp-buc7
66
vulnerability VCID-mm88-amve-quh6
67
vulnerability VCID-mvjk-gp4c-f7h8
68
vulnerability VCID-netm-9gxh-3yh4
69
vulnerability VCID-nrut-syek-s7fg
70
vulnerability VCID-nuh8-qd25-ykan
71
vulnerability VCID-pdv9-xrh8-d3fz
72
vulnerability VCID-qh44-gavt-rbdw
73
vulnerability VCID-qp6y-dt1j-97df
74
vulnerability VCID-qpnt-xvgv-s3cq
75
vulnerability VCID-qqte-z1e6-xuh7
76
vulnerability VCID-qtp3-a1g7-8kgw
77
vulnerability VCID-qv3r-ppuc-zycz
78
vulnerability VCID-qxwq-xwaw-nyak
79
vulnerability VCID-r7q9-7u4b-83cz
80
vulnerability VCID-rhgj-t5cp-wkbh
81
vulnerability VCID-rsvx-3f49-v3an
82
vulnerability VCID-s3j9-1zq5-zkf5
83
vulnerability VCID-s9r4-a3uz-4yhp
84
vulnerability VCID-t53m-6vvr-27cf
85
vulnerability VCID-t9pa-yw9s-kqb9
86
vulnerability VCID-tazr-2qgq-77fy
87
vulnerability VCID-tn87-vke6-kuf6
88
vulnerability VCID-ttud-e3xr-dudd
89
vulnerability VCID-tyk2-gq2c-bbcn
90
vulnerability VCID-udew-3gre-13hy
91
vulnerability VCID-ugyh-dycm-3bc3
92
vulnerability VCID-vcq9-93xd-nfbe
93
vulnerability VCID-vf7b-s3y3-sfhw
94
vulnerability VCID-wc4g-sxyq-ubcd
95
vulnerability VCID-wj66-7n6c-9kam
96
vulnerability VCID-wtxh-xxp2-d3hr
97
vulnerability VCID-wy5v-dsp3-a7aa
98
vulnerability VCID-x9ej-7dcq-tub2
99
vulnerability VCID-xps8-1a3r-wke6
100
vulnerability VCID-xzhu-mq3f-3bd1
101
vulnerability VCID-yj1q-xst4-y7eb
102
vulnerability VCID-ymhr-ads4-qqdp
103
vulnerability VCID-yytk-k1y3-p3hp
104
vulnerability VCID-z8ds-n38f-2uby
105
vulnerability VCID-zm21-2pqq-3ker
106
vulnerability VCID-zz7k-hf7j-qff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.6.27.dfsg-1
3
url pkg:deb/debian/libxml2@2.6.27.dfsg-6%2Betch1
purl pkg:deb/debian/libxml2@2.6.27.dfsg-6%2Betch1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1d83-bsv8-ckhz
1
vulnerability VCID-27jd-t23h-73f4
2
vulnerability VCID-2b1g-gp84-87e8
3
vulnerability VCID-2j62-5rjn-vyeu
4
vulnerability VCID-2r5u-7wpy-4yf9
5
vulnerability VCID-31w8-13b6-8beh
6
vulnerability VCID-33n1-125n-63h6
7
vulnerability VCID-3d1e-enaq-q3cx
8
vulnerability VCID-3s4n-twju-b3dw
9
vulnerability VCID-3whx-6t3e-7beq
10
vulnerability VCID-464a-typa-7qbu
11
vulnerability VCID-4hws-gtxr-3bge
12
vulnerability VCID-4m3j-qy8c-4uhk
13
vulnerability VCID-51f2-w9b7-9fb4
14
vulnerability VCID-57yv-ay7b-v7ev
15
vulnerability VCID-5j6d-yzbn-h3ha
16
vulnerability VCID-62te-7sds-wbbh
17
vulnerability VCID-69ff-ngna-mkbv
18
vulnerability VCID-6h9f-6pmg-3fh3
19
vulnerability VCID-74y5-vcxn-2ygr
20
vulnerability VCID-782a-uast-nbch
21
vulnerability VCID-7bpp-2hvk-2udv
22
vulnerability VCID-7f2n-978e-dkh5
23
vulnerability VCID-7h3p-7ej2-17f1
24
vulnerability VCID-7rzw-9jj5-4ybk
25
vulnerability VCID-86mu-krba-a3e9
26
vulnerability VCID-8d2w-3c3p-zqaz
27
vulnerability VCID-8pmj-m5vu-4uc2
28
vulnerability VCID-8tej-h12t-2fag
29
vulnerability VCID-9hqf-12yh-bkc8
30
vulnerability VCID-9p2f-ynzb-r3gj
31
vulnerability VCID-9q49-2srz-rkg7
32
vulnerability VCID-aasn-u7fd-8bhy
33
vulnerability VCID-ah8e-sxuu-jqcw
34
vulnerability VCID-ahha-vnq4-7qd2
35
vulnerability VCID-axc8-mw7j-7ufg
36
vulnerability VCID-ayqh-mrmn-tqgg
37
vulnerability VCID-azzy-m5pc-qudn
38
vulnerability VCID-b4bz-7ttk-d3ae
39
vulnerability VCID-b5tz-9s1v-pkg7
40
vulnerability VCID-bejh-22y7-kuh6
41
vulnerability VCID-bk98-bfkg-7bdt
42
vulnerability VCID-bp8r-8jjt-hygw
43
vulnerability VCID-bz1e-1ypb-kkgg
44
vulnerability VCID-c9ds-faa9-t7be
45
vulnerability VCID-cbm2-cez4-bqgh
46
vulnerability VCID-cgfv-pps6-6khd
47
vulnerability VCID-d68t-f8j1-h3am
48
vulnerability VCID-drkd-yykc-ayge
49
vulnerability VCID-dzxg-zych-1yd1
50
vulnerability VCID-e9c3-5gws-u3fp
51
vulnerability VCID-eb6k-ppfd-m7a3
52
vulnerability VCID-ecde-c15q-ukh1
53
vulnerability VCID-eebz-xjem-cygz
54
vulnerability VCID-ek5d-m9pn-3fec
55
vulnerability VCID-fc6w-68hw-4kfx
56
vulnerability VCID-frd7-r2rj-s7c7
57
vulnerability VCID-ghaf-ynsg-uuea
58
vulnerability VCID-gvmn-4dtv-8qcj
59
vulnerability VCID-gxsm-qvkt-gygy
60
vulnerability VCID-h6qs-dgys-afes
61
vulnerability VCID-hafa-bcpu-8uaj
62
vulnerability VCID-hz3p-4d8c-z7gm
63
vulnerability VCID-js7v-8a5j-h7ba
64
vulnerability VCID-ked7-5tjg-nudx
65
vulnerability VCID-mhwv-kcxp-buc7
66
vulnerability VCID-mm88-amve-quh6
67
vulnerability VCID-mvjk-gp4c-f7h8
68
vulnerability VCID-netm-9gxh-3yh4
69
vulnerability VCID-nrut-syek-s7fg
70
vulnerability VCID-nuh8-qd25-ykan
71
vulnerability VCID-pdv9-xrh8-d3fz
72
vulnerability VCID-qh44-gavt-rbdw
73
vulnerability VCID-qp6y-dt1j-97df
74
vulnerability VCID-qpnt-xvgv-s3cq
75
vulnerability VCID-qqte-z1e6-xuh7
76
vulnerability VCID-qtp3-a1g7-8kgw
77
vulnerability VCID-qv3r-ppuc-zycz
78
vulnerability VCID-qxwq-xwaw-nyak
79
vulnerability VCID-r7q9-7u4b-83cz
80
vulnerability VCID-rhgj-t5cp-wkbh
81
vulnerability VCID-rsvx-3f49-v3an
82
vulnerability VCID-s3j9-1zq5-zkf5
83
vulnerability VCID-s9r4-a3uz-4yhp
84
vulnerability VCID-t53m-6vvr-27cf
85
vulnerability VCID-t9pa-yw9s-kqb9
86
vulnerability VCID-tazr-2qgq-77fy
87
vulnerability VCID-tn87-vke6-kuf6
88
vulnerability VCID-ttud-e3xr-dudd
89
vulnerability VCID-tyk2-gq2c-bbcn
90
vulnerability VCID-udew-3gre-13hy
91
vulnerability VCID-ugyh-dycm-3bc3
92
vulnerability VCID-vcq9-93xd-nfbe
93
vulnerability VCID-vf7b-s3y3-sfhw
94
vulnerability VCID-wc4g-sxyq-ubcd
95
vulnerability VCID-wj66-7n6c-9kam
96
vulnerability VCID-wtxh-xxp2-d3hr
97
vulnerability VCID-wy5v-dsp3-a7aa
98
vulnerability VCID-x9ej-7dcq-tub2
99
vulnerability VCID-xps8-1a3r-wke6
100
vulnerability VCID-xzhu-mq3f-3bd1
101
vulnerability VCID-yj1q-xst4-y7eb
102
vulnerability VCID-ymhr-ads4-qqdp
103
vulnerability VCID-yytk-k1y3-p3hp
104
vulnerability VCID-z8ds-n38f-2uby
105
vulnerability VCID-zm21-2pqq-3ker
106
vulnerability VCID-zz7k-hf7j-qff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.6.27.dfsg-6%252Betch1
4
url pkg:deb/debian/libxml2@2.6.32.dfsg-5%2Blenny5
purl pkg:deb/debian/libxml2@2.6.32.dfsg-5%2Blenny5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-27jd-t23h-73f4
1
vulnerability VCID-2b1g-gp84-87e8
2
vulnerability VCID-2j62-5rjn-vyeu
3
vulnerability VCID-2r5u-7wpy-4yf9
4
vulnerability VCID-31w8-13b6-8beh
5
vulnerability VCID-33n1-125n-63h6
6
vulnerability VCID-3d1e-enaq-q3cx
7
vulnerability VCID-3s4n-twju-b3dw
8
vulnerability VCID-3whx-6t3e-7beq
9
vulnerability VCID-464a-typa-7qbu
10
vulnerability VCID-4hws-gtxr-3bge
11
vulnerability VCID-4m3j-qy8c-4uhk
12
vulnerability VCID-51f2-w9b7-9fb4
13
vulnerability VCID-57yv-ay7b-v7ev
14
vulnerability VCID-62te-7sds-wbbh
15
vulnerability VCID-69ff-ngna-mkbv
16
vulnerability VCID-6h9f-6pmg-3fh3
17
vulnerability VCID-74y5-vcxn-2ygr
18
vulnerability VCID-782a-uast-nbch
19
vulnerability VCID-7bpp-2hvk-2udv
20
vulnerability VCID-7f2n-978e-dkh5
21
vulnerability VCID-7h3p-7ej2-17f1
22
vulnerability VCID-7rzw-9jj5-4ybk
23
vulnerability VCID-86mu-krba-a3e9
24
vulnerability VCID-8d2w-3c3p-zqaz
25
vulnerability VCID-8pmj-m5vu-4uc2
26
vulnerability VCID-8tej-h12t-2fag
27
vulnerability VCID-9hqf-12yh-bkc8
28
vulnerability VCID-9p2f-ynzb-r3gj
29
vulnerability VCID-9q49-2srz-rkg7
30
vulnerability VCID-aasn-u7fd-8bhy
31
vulnerability VCID-ah8e-sxuu-jqcw
32
vulnerability VCID-ahha-vnq4-7qd2
33
vulnerability VCID-axc8-mw7j-7ufg
34
vulnerability VCID-ayqh-mrmn-tqgg
35
vulnerability VCID-azzy-m5pc-qudn
36
vulnerability VCID-b4bz-7ttk-d3ae
37
vulnerability VCID-b5tz-9s1v-pkg7
38
vulnerability VCID-bejh-22y7-kuh6
39
vulnerability VCID-bk98-bfkg-7bdt
40
vulnerability VCID-bp8r-8jjt-hygw
41
vulnerability VCID-bz1e-1ypb-kkgg
42
vulnerability VCID-c9ds-faa9-t7be
43
vulnerability VCID-cbm2-cez4-bqgh
44
vulnerability VCID-cgfv-pps6-6khd
45
vulnerability VCID-d68t-f8j1-h3am
46
vulnerability VCID-drkd-yykc-ayge
47
vulnerability VCID-dzxg-zych-1yd1
48
vulnerability VCID-e9c3-5gws-u3fp
49
vulnerability VCID-eb6k-ppfd-m7a3
50
vulnerability VCID-ecde-c15q-ukh1
51
vulnerability VCID-eebz-xjem-cygz
52
vulnerability VCID-ek5d-m9pn-3fec
53
vulnerability VCID-fc6w-68hw-4kfx
54
vulnerability VCID-ghaf-ynsg-uuea
55
vulnerability VCID-gvmn-4dtv-8qcj
56
vulnerability VCID-gxsm-qvkt-gygy
57
vulnerability VCID-h6qs-dgys-afes
58
vulnerability VCID-hafa-bcpu-8uaj
59
vulnerability VCID-hz3p-4d8c-z7gm
60
vulnerability VCID-js7v-8a5j-h7ba
61
vulnerability VCID-ked7-5tjg-nudx
62
vulnerability VCID-mhwv-kcxp-buc7
63
vulnerability VCID-mm88-amve-quh6
64
vulnerability VCID-netm-9gxh-3yh4
65
vulnerability VCID-nrut-syek-s7fg
66
vulnerability VCID-nuh8-qd25-ykan
67
vulnerability VCID-pdv9-xrh8-d3fz
68
vulnerability VCID-qh44-gavt-rbdw
69
vulnerability VCID-qp6y-dt1j-97df
70
vulnerability VCID-qpnt-xvgv-s3cq
71
vulnerability VCID-qqte-z1e6-xuh7
72
vulnerability VCID-qtp3-a1g7-8kgw
73
vulnerability VCID-qv3r-ppuc-zycz
74
vulnerability VCID-qxwq-xwaw-nyak
75
vulnerability VCID-r7q9-7u4b-83cz
76
vulnerability VCID-rhgj-t5cp-wkbh
77
vulnerability VCID-rsvx-3f49-v3an
78
vulnerability VCID-s3j9-1zq5-zkf5
79
vulnerability VCID-s9r4-a3uz-4yhp
80
vulnerability VCID-t53m-6vvr-27cf
81
vulnerability VCID-t9pa-yw9s-kqb9
82
vulnerability VCID-tazr-2qgq-77fy
83
vulnerability VCID-tn87-vke6-kuf6
84
vulnerability VCID-ttud-e3xr-dudd
85
vulnerability VCID-tyk2-gq2c-bbcn
86
vulnerability VCID-udew-3gre-13hy
87
vulnerability VCID-ugyh-dycm-3bc3
88
vulnerability VCID-vcq9-93xd-nfbe
89
vulnerability VCID-vf7b-s3y3-sfhw
90
vulnerability VCID-wc4g-sxyq-ubcd
91
vulnerability VCID-wj66-7n6c-9kam
92
vulnerability VCID-wtxh-xxp2-d3hr
93
vulnerability VCID-wy5v-dsp3-a7aa
94
vulnerability VCID-x9ej-7dcq-tub2
95
vulnerability VCID-xps8-1a3r-wke6
96
vulnerability VCID-yj1q-xst4-y7eb
97
vulnerability VCID-ymhr-ads4-qqdp
98
vulnerability VCID-yytk-k1y3-p3hp
99
vulnerability VCID-z8ds-n38f-2uby
100
vulnerability VCID-zm21-2pqq-3ker
101
vulnerability VCID-zz7k-hf7j-qff5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.6.32.dfsg-5%252Blenny5
5
url pkg:deb/debian/libxml2@2.7.8.dfsg-2%2Bsqueeze8
purl pkg:deb/debian/libxml2@2.7.8.dfsg-2%2Bsqueeze8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-27jd-t23h-73f4
1
vulnerability VCID-2b1g-gp84-87e8
2
vulnerability VCID-2j62-5rjn-vyeu
3
vulnerability VCID-2r5u-7wpy-4yf9
4
vulnerability VCID-31w8-13b6-8beh
5
vulnerability VCID-33n1-125n-63h6
6
vulnerability VCID-3d1e-enaq-q3cx
7
vulnerability VCID-3s4n-twju-b3dw
8
vulnerability VCID-3whx-6t3e-7beq
9
vulnerability VCID-464a-typa-7qbu
10
vulnerability VCID-4hws-gtxr-3bge
11
vulnerability VCID-4m3j-qy8c-4uhk
12
vulnerability VCID-51f2-w9b7-9fb4
13
vulnerability VCID-57yv-ay7b-v7ev
14
vulnerability VCID-62te-7sds-wbbh
15
vulnerability VCID-69ff-ngna-mkbv
16
vulnerability VCID-6h9f-6pmg-3fh3
17
vulnerability VCID-74y5-vcxn-2ygr
18
vulnerability VCID-782a-uast-nbch
19
vulnerability VCID-7bpp-2hvk-2udv
20
vulnerability VCID-7f2n-978e-dkh5
21
vulnerability VCID-7h3p-7ej2-17f1
22
vulnerability VCID-7rzw-9jj5-4ybk
23
vulnerability VCID-86mu-krba-a3e9
24
vulnerability VCID-8d2w-3c3p-zqaz
25
vulnerability VCID-8pmj-m5vu-4uc2
26
vulnerability VCID-8tej-h12t-2fag
27
vulnerability VCID-9hqf-12yh-bkc8
28
vulnerability VCID-9p2f-ynzb-r3gj
29
vulnerability VCID-9q49-2srz-rkg7
30
vulnerability VCID-aasn-u7fd-8bhy
31
vulnerability VCID-ah8e-sxuu-jqcw
32
vulnerability VCID-ahha-vnq4-7qd2
33
vulnerability VCID-ayqh-mrmn-tqgg
34
vulnerability VCID-azzy-m5pc-qudn
35
vulnerability VCID-b5tz-9s1v-pkg7
36
vulnerability VCID-bejh-22y7-kuh6
37
vulnerability VCID-bk98-bfkg-7bdt
38
vulnerability VCID-bp8r-8jjt-hygw
39
vulnerability VCID-bz1e-1ypb-kkgg
40
vulnerability VCID-c9ds-faa9-t7be
41
vulnerability VCID-cbm2-cez4-bqgh
42
vulnerability VCID-cgfv-pps6-6khd
43
vulnerability VCID-d68t-f8j1-h3am
44
vulnerability VCID-drkd-yykc-ayge
45
vulnerability VCID-dzxg-zych-1yd1
46
vulnerability VCID-e9c3-5gws-u3fp
47
vulnerability VCID-eb6k-ppfd-m7a3
48
vulnerability VCID-ecde-c15q-ukh1
49
vulnerability VCID-eebz-xjem-cygz
50
vulnerability VCID-ek5d-m9pn-3fec
51
vulnerability VCID-fc6w-68hw-4kfx
52
vulnerability VCID-ghaf-ynsg-uuea
53
vulnerability VCID-gvmn-4dtv-8qcj
54
vulnerability VCID-gxsm-qvkt-gygy
55
vulnerability VCID-h6qs-dgys-afes
56
vulnerability VCID-hafa-bcpu-8uaj
57
vulnerability VCID-js7v-8a5j-h7ba
58
vulnerability VCID-ked7-5tjg-nudx
59
vulnerability VCID-mhwv-kcxp-buc7
60
vulnerability VCID-mm88-amve-quh6
61
vulnerability VCID-netm-9gxh-3yh4
62
vulnerability VCID-nrut-syek-s7fg
63
vulnerability VCID-nuh8-qd25-ykan
64
vulnerability VCID-pdv9-xrh8-d3fz
65
vulnerability VCID-qh44-gavt-rbdw
66
vulnerability VCID-qp6y-dt1j-97df
67
vulnerability VCID-qpnt-xvgv-s3cq
68
vulnerability VCID-qqte-z1e6-xuh7
69
vulnerability VCID-qtp3-a1g7-8kgw
70
vulnerability VCID-qv3r-ppuc-zycz
71
vulnerability VCID-qxwq-xwaw-nyak
72
vulnerability VCID-r7q9-7u4b-83cz
73
vulnerability VCID-rhgj-t5cp-wkbh
74
vulnerability VCID-rsvx-3f49-v3an
75
vulnerability VCID-s3j9-1zq5-zkf5
76
vulnerability VCID-s9r4-a3uz-4yhp
77
vulnerability VCID-t53m-6vvr-27cf
78
vulnerability VCID-t9pa-yw9s-kqb9
79
vulnerability VCID-tazr-2qgq-77fy
80
vulnerability VCID-tn87-vke6-kuf6
81
vulnerability VCID-ttud-e3xr-dudd
82
vulnerability VCID-tyk2-gq2c-bbcn
83
vulnerability VCID-udew-3gre-13hy
84
vulnerability VCID-ugyh-dycm-3bc3
85
vulnerability VCID-vcq9-93xd-nfbe
86
vulnerability VCID-vf7b-s3y3-sfhw
87
vulnerability VCID-wc4g-sxyq-ubcd
88
vulnerability VCID-wj66-7n6c-9kam
89
vulnerability VCID-wtxh-xxp2-d3hr
90
vulnerability VCID-wy5v-dsp3-a7aa
91
vulnerability VCID-x9ej-7dcq-tub2
92
vulnerability VCID-xps8-1a3r-wke6
93
vulnerability VCID-yj1q-xst4-y7eb
94
vulnerability VCID-ymhr-ads4-qqdp
95
vulnerability VCID-yytk-k1y3-p3hp
96
vulnerability VCID-z8ds-n38f-2uby
97
vulnerability VCID-zm21-2pqq-3ker
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.7.8.dfsg-2%252Bsqueeze8
6
url pkg:deb/debian/libxml2@2.7.8.dfsg-2%2Bsqueeze16
purl pkg:deb/debian/libxml2@2.7.8.dfsg-2%2Bsqueeze16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-27jd-t23h-73f4
1
vulnerability VCID-2b1g-gp84-87e8
2
vulnerability VCID-2j62-5rjn-vyeu
3
vulnerability VCID-2r5u-7wpy-4yf9
4
vulnerability VCID-31w8-13b6-8beh
5
vulnerability VCID-33n1-125n-63h6
6
vulnerability VCID-3d1e-enaq-q3cx
7
vulnerability VCID-3s4n-twju-b3dw
8
vulnerability VCID-3whx-6t3e-7beq
9
vulnerability VCID-464a-typa-7qbu
10
vulnerability VCID-4hws-gtxr-3bge
11
vulnerability VCID-4m3j-qy8c-4uhk
12
vulnerability VCID-51f2-w9b7-9fb4
13
vulnerability VCID-57yv-ay7b-v7ev
14
vulnerability VCID-62te-7sds-wbbh
15
vulnerability VCID-69ff-ngna-mkbv
16
vulnerability VCID-6h9f-6pmg-3fh3
17
vulnerability VCID-74y5-vcxn-2ygr
18
vulnerability VCID-782a-uast-nbch
19
vulnerability VCID-7bpp-2hvk-2udv
20
vulnerability VCID-7f2n-978e-dkh5
21
vulnerability VCID-7h3p-7ej2-17f1
22
vulnerability VCID-7rzw-9jj5-4ybk
23
vulnerability VCID-86mu-krba-a3e9
24
vulnerability VCID-8d2w-3c3p-zqaz
25
vulnerability VCID-8pmj-m5vu-4uc2
26
vulnerability VCID-8tej-h12t-2fag
27
vulnerability VCID-9hqf-12yh-bkc8
28
vulnerability VCID-9p2f-ynzb-r3gj
29
vulnerability VCID-9q49-2srz-rkg7
30
vulnerability VCID-aasn-u7fd-8bhy
31
vulnerability VCID-ah8e-sxuu-jqcw
32
vulnerability VCID-ahha-vnq4-7qd2
33
vulnerability VCID-ayqh-mrmn-tqgg
34
vulnerability VCID-azzy-m5pc-qudn
35
vulnerability VCID-b5tz-9s1v-pkg7
36
vulnerability VCID-bejh-22y7-kuh6
37
vulnerability VCID-bk98-bfkg-7bdt
38
vulnerability VCID-bp8r-8jjt-hygw
39
vulnerability VCID-bz1e-1ypb-kkgg
40
vulnerability VCID-c9ds-faa9-t7be
41
vulnerability VCID-cbm2-cez4-bqgh
42
vulnerability VCID-cgfv-pps6-6khd
43
vulnerability VCID-d68t-f8j1-h3am
44
vulnerability VCID-drkd-yykc-ayge
45
vulnerability VCID-dzxg-zych-1yd1
46
vulnerability VCID-e9c3-5gws-u3fp
47
vulnerability VCID-eb6k-ppfd-m7a3
48
vulnerability VCID-ecde-c15q-ukh1
49
vulnerability VCID-eebz-xjem-cygz
50
vulnerability VCID-ek5d-m9pn-3fec
51
vulnerability VCID-fc6w-68hw-4kfx
52
vulnerability VCID-ghaf-ynsg-uuea
53
vulnerability VCID-gvmn-4dtv-8qcj
54
vulnerability VCID-gxsm-qvkt-gygy
55
vulnerability VCID-h6qs-dgys-afes
56
vulnerability VCID-hafa-bcpu-8uaj
57
vulnerability VCID-js7v-8a5j-h7ba
58
vulnerability VCID-ked7-5tjg-nudx
59
vulnerability VCID-mhwv-kcxp-buc7
60
vulnerability VCID-mm88-amve-quh6
61
vulnerability VCID-netm-9gxh-3yh4
62
vulnerability VCID-nrut-syek-s7fg
63
vulnerability VCID-nuh8-qd25-ykan
64
vulnerability VCID-pdv9-xrh8-d3fz
65
vulnerability VCID-qh44-gavt-rbdw
66
vulnerability VCID-qp6y-dt1j-97df
67
vulnerability VCID-qpnt-xvgv-s3cq
68
vulnerability VCID-qqte-z1e6-xuh7
69
vulnerability VCID-qtp3-a1g7-8kgw
70
vulnerability VCID-qv3r-ppuc-zycz
71
vulnerability VCID-qxwq-xwaw-nyak
72
vulnerability VCID-r7q9-7u4b-83cz
73
vulnerability VCID-rhgj-t5cp-wkbh
74
vulnerability VCID-rsvx-3f49-v3an
75
vulnerability VCID-s3j9-1zq5-zkf5
76
vulnerability VCID-s9r4-a3uz-4yhp
77
vulnerability VCID-t53m-6vvr-27cf
78
vulnerability VCID-t9pa-yw9s-kqb9
79
vulnerability VCID-tazr-2qgq-77fy
80
vulnerability VCID-tn87-vke6-kuf6
81
vulnerability VCID-ttud-e3xr-dudd
82
vulnerability VCID-tyk2-gq2c-bbcn
83
vulnerability VCID-udew-3gre-13hy
84
vulnerability VCID-ugyh-dycm-3bc3
85
vulnerability VCID-vcq9-93xd-nfbe
86
vulnerability VCID-vf7b-s3y3-sfhw
87
vulnerability VCID-wc4g-sxyq-ubcd
88
vulnerability VCID-wj66-7n6c-9kam
89
vulnerability VCID-wtxh-xxp2-d3hr
90
vulnerability VCID-wy5v-dsp3-a7aa
91
vulnerability VCID-x9ej-7dcq-tub2
92
vulnerability VCID-xps8-1a3r-wke6
93
vulnerability VCID-yj1q-xst4-y7eb
94
vulnerability VCID-ymhr-ads4-qqdp
95
vulnerability VCID-yytk-k1y3-p3hp
96
vulnerability VCID-z8ds-n38f-2uby
97
vulnerability VCID-zm21-2pqq-3ker
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml2@2.7.8.dfsg-2%252Bsqueeze16
7
url pkg:nuget/libxml2@1.7.0
purl pkg:nuget/libxml2@1.7.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r5u-7wpy-4yf9
1
vulnerability VCID-h6qs-dgys-afes
2
vulnerability VCID-nrut-syek-s7fg
3
vulnerability VCID-yj1q-xst4-y7eb
4
vulnerability VCID-yytk-k1y3-p3hp
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libxml2@1.7.0
8
url pkg:nuget/libxml2@2.3.5
purl pkg:nuget/libxml2@2.3.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h6qs-dgys-afes
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libxml2@2.3.5
9
url pkg:rpm/redhat/libxml2@2.6.26-2.1.15.el5_8?arch=6
purl pkg:rpm/redhat/libxml2@2.6.26-2.1.15.el5_8?arch=6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h6qs-dgys-afes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libxml2@2.6.26-2.1.15.el5_8%3Farch=6
10
url pkg:rpm/redhat/libxml2@2.7.6-8.el6_3?arch=4
purl pkg:rpm/redhat/libxml2@2.7.6-8.el6_3?arch=4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-h6qs-dgys-afes
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libxml2@2.7.6-8.el6_3%3Farch=4
11
url pkg:rpm/redhat/mingw32-libxml2@2.7.6-6?arch=el6_3
purl pkg:rpm/redhat/mingw32-libxml2@2.7.6-6?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7f2n-978e-dkh5
1
vulnerability VCID-8pmj-m5vu-4uc2
2
vulnerability VCID-axc8-mw7j-7ufg
3
vulnerability VCID-ayqh-mrmn-tqgg
4
vulnerability VCID-dzxg-zych-1yd1
5
vulnerability VCID-h6qs-dgys-afes
6
vulnerability VCID-hz3p-4d8c-z7gm
7
vulnerability VCID-js7v-8a5j-h7ba
8
vulnerability VCID-ttud-e3xr-dudd
9
vulnerability VCID-yytk-k1y3-p3hp
10
vulnerability VCID-z8ds-n38f-2uby
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mingw32-libxml2@2.7.6-6%3Farch=el6_3
References
0
reference_url http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d
reference_id
reference_type
scores
url http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d
1
reference_url http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html
2
reference_url http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
3
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2012-1512.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1512.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2013-0217.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0217.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5134.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5134.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5134
reference_id
reference_type
scores
0
value 0.02065
scoring_system epss
scoring_elements 0.8395
published_at 2026-04-16T12:55:00Z
1
value 0.02065
scoring_system epss
scoring_elements 0.83858
published_at 2026-04-01T12:55:00Z
2
value 0.02065
scoring_system epss
scoring_elements 0.83872
published_at 2026-04-02T12:55:00Z
3
value 0.02065
scoring_system epss
scoring_elements 0.83888
published_at 2026-04-04T12:55:00Z
4
value 0.02065
scoring_system epss
scoring_elements 0.83889
published_at 2026-04-07T12:55:00Z
5
value 0.02065
scoring_system epss
scoring_elements 0.83912
published_at 2026-04-08T12:55:00Z
6
value 0.02065
scoring_system epss
scoring_elements 0.83919
published_at 2026-04-09T12:55:00Z
7
value 0.02065
scoring_system epss
scoring_elements 0.83935
published_at 2026-04-11T12:55:00Z
8
value 0.02065
scoring_system epss
scoring_elements 0.8393
published_at 2026-04-12T12:55:00Z
9
value 0.02065
scoring_system epss
scoring_elements 0.83926
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5134
11
reference_url https://code.google.com/p/chromium/issues/detail?id=158249
reference_id
reference_type
scores
url https://code.google.com/p/chromium/issues/detail?id=158249
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
13
reference_url http://secunia.com/advisories/51448
reference_id
reference_type
scores
url http://secunia.com/advisories/51448
14
reference_url http://secunia.com/advisories/54886
reference_id
reference_type
scores
url http://secunia.com/advisories/54886
15
reference_url http://secunia.com/advisories/55568
reference_id
reference_type
scores
url http://secunia.com/advisories/55568
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80294
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80294
17
reference_url http://support.apple.com/kb/HT5934
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5934
18
reference_url http://support.apple.com/kb/HT6001
reference_id
reference_type
scores
url http://support.apple.com/kb/HT6001
19
reference_url http://www.debian.org/security/2012/dsa-2580
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2580
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
21
reference_url http://www.securityfocus.com/bid/56684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56684
22
reference_url http://www.securitytracker.com/id?1027815
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027815
23
reference_url http://www.ubuntu.com/usn/USN-1656-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1656-1
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694521
reference_id 694521
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694521
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=880466
reference_id 880466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=880466
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
220
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
221
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
222
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
223
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
224
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
225
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
226
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
227
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
228
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
229
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
230
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
231
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
232
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
233
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*
234
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
235
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
236
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*
237
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
238
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
239
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
240
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
241
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*
242
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*
243
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*
244
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*
245
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*
246
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*
247
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*
248
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*
249
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*
250
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*
251
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*
252
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5134
reference_id CVE-2012-5134
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5134
253
reference_url https://security.gentoo.org/glsa/201311-06
reference_id GLSA-201311-06
reference_type
scores
url https://security.gentoo.org/glsa/201311-06
254
reference_url https://access.redhat.com/errata/RHSA-2012:1512
reference_id RHSA-2012:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1512
255
reference_url https://access.redhat.com/errata/RHSA-2013:0217
reference_id RHSA-2013:0217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0217
256
reference_url https://usn.ubuntu.com/1656-1/
reference_id USN-1656-1
reference_type
scores
url https://usn.ubuntu.com/1656-1/
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score6.8 - 6.8
Exploitability0.5
Weighted_severity6.1
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-h6qs-dgys-afes