Search for packages
| purl | pkg:rpm/redhat/mingw32-libxml2@2.7.6-6?arch=el6_3 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-7f2n-978e-dkh5
Aliases: CVE-2011-3102 |
A off-by-one error in libxml2 could result in execution of arbitrary code or Denial of Service. | There are no reported fixed by versions. |
|
VCID-8pmj-m5vu-4uc2
Aliases: CVE-2011-2821 |
Multiple vulnerabilities were found in libxml2 which could lead to execution of arbitrary code or a Denial of Service. | There are no reported fixed by versions. |
|
VCID-axc8-mw7j-7ufg
Aliases: CVE-2010-4494 |
Double Free Double free vulnerability in libxml2 and other versions, as used in Google Chrome and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling. | There are no reported fixed by versions. |
|
VCID-ayqh-mrmn-tqgg
Aliases: CVE-2011-0216 |
libxml2: Off-by-one error leading to heap-based buffer overflow in encoding | There are no reported fixed by versions. |
|
VCID-dzxg-zych-1yd1
Aliases: CVE-2011-3905 |
libxml2 out of bounds read | There are no reported fixed by versions. |
|
VCID-h6qs-dgys-afes
Aliases: CVE-2012-5134 |
Improper Restriction of Operations within the Bounds of a Memory Buffer Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2, as used in Google Chrome and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document. | There are no reported fixed by versions. |
|
VCID-hz3p-4d8c-z7gm
Aliases: CVE-2010-4008 |
Improper Restriction of Operations within the Bounds of a Memory Buffer libxml2, as used in Google Chrome, Apple Safari, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document. | There are no reported fixed by versions. |
|
VCID-js7v-8a5j-h7ba
Aliases: CVE-2011-2834 |
Multiple vulnerabilities have been reported in Chromium and V8, some of which may allow execution of arbitrary code and local root privilege escalation. | There are no reported fixed by versions. |
|
VCID-ttud-e3xr-dudd
Aliases: CVE-2011-1944 |
Integer Overflow Integer overflow in xpath.c in libxml2, and libxml, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. | There are no reported fixed by versions. |
|
VCID-yytk-k1y3-p3hp
Aliases: CVE-2012-0841 |
Uncontrolled Resource Consumption libxml2 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data. | There are no reported fixed by versions. |
|
VCID-z8ds-n38f-2uby
Aliases: CVE-2011-3919 |
A boundary error in libxml2 could result in execution of arbitrary code or Denial of Service. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||