Filter
AND

libxml2Use-after-free in libxml2 through 2.11.5

First published (updated )

libxml2Buffer Overflow

First published (updated )

IBM QRadar Network Packet CaptureBuffer Overflow

First published (updated )

F5 BIG-IPNull Pointer Dereference

First published (updated )

Apple iOSInput Validation, Double Free, Buffer Overflow, Use After Free, Race Condition

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/libxml2XSS

First published (updated )

libxml2xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-fi…

First published (updated )

libxml2xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak. Re…

First published (updated )

redhat/libxml2The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers …

First published (updated )

Ubuntu LinuxLast updated 24 July 2024

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/libxml2Last updated 24 July 2024

First published (updated )

Apple macOSNull Pointer Dereference

First published (updated )

xmlsecxmlsec is vulnerable to XML External Entity Expansion via libxml2 (see <a href="https://access.redha…

First published (updated )

Red Hat JBoss Core ServicesIt was found that Red Hat JBoss Core Services incorrectly included <a href="https://access.redhat.co…

First published (updated )

Red Hat JBoss Core ServicesIt was found that Red Hat JBoss Core Services incorrectly fixed <a href="https://access.redhat.com/s…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Ubuntu LinuxXEE

First published (updated )

libxml2A vulnerability was found in the libxml2 library. A heap-based buffer overread could happen in xmlNe…

First published (updated )

libxml2A vulnerability was found in the libxml2 library. A heap-based buffer overread could happen in xmlPa…

First published (updated )

libxml2A vulnerability was found in the libxml2 library. A heap-based buffer overread could happen in xmlDi…

First published (updated )

libxml2A vulnerability was found in the libxml2 library. A heap-use-after free can happen in the xmlDictCom…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

libxml2A vulnerability was found in the libxml2 library. The parser would fetch content of an external enti…

First published (updated )

libxml2A vulnerability was found in the libxml2 library. There exist a possible format string vulnerability…

First published (updated )

libxml2Use After Free

First published (updated )

libxml2Use After Free

First published (updated )

libxml2A vulnerability was found in the libxml2 library. A maliciously crafted file could cause the applica…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

libxml2A vulnerability was found in the libxml2 library. A maliciously crafted file could cause the applica…

First published (updated )

libxml2A vulnerability was found in libxml2. Parsing a maliciously crafted xml file could cause the applica…

First published (updated )

libxml2It is possible to trigger a stack overflow using a carefully crafted invalid xml file, the stack ove…

First published (updated )

redhat jboss core serviceslibxml2: out-of-bounds read

First published (updated )

libxml2A vulnerability was found in a way libxml2 parses certain files. With the libxml2 in recovery mode, …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203