Filter
-Infinity
0

libxml2-develBuffer Overflow

First published (updated )

libxml2-develNull Pointer Dereference

7.5
EPSS
0.06%
First published (updated )

libxml2-develUse After Free

7.5
EPSS
0.05%
First published (updated )

libxml2-develUse-after-free in libxml2 through 2.11.5

First published (updated )

libxml2-develBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

IBM QRadar Network Packet CaptureBuffer Overflow

First published (updated )

F5 BIG-IP and BIG-IQ Centralized ManagementNull Pointer Dereference

First published (updated )

redhat/libxml2Input Validation, Double Free, Buffer Overflow, Use After Free, Race Condition

First published (updated )

redhat/libxml2Integer Overflow, Input Validation, Race Condition, Double Free

7.5
First published (updated )

redhat/libxml2Double Free, Input Validation, Race Condition, Integer Overflow

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/libxml2XSS

First published (updated )

lxmlNULL Pointer Dereference in lxml/lxml

7.5
First published (updated )

redhat/libxml2Integer Overflow

7.4
First published (updated )

Apple iOS and macOSUse After Free, Input Validation, Buffer Overflow, Integer Overflow, Race Condition

8.1
First published (updated )

Splunk Universal ForwarderUse after free in Blink XSLT

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat Enterprise LinuxNull Pointer Dereference

7.5
First published (updated )

redhat/jbcs-httpd24-apr-utilBuffer Overflow

8.6
First published (updated )

redhat/jbcs-httpd24-apr-utilUse After Free

8.8
First published (updated )

Red Hat Enterprise LinuxUse After Free

7.8
First published (updated )

redhat/jbcs-httpd24-apr-utilA flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Red Hat FedoraBuffer Overflow

7.8
First published (updated )

IBM InfoSphere Guardium z/OSLast updated 24 July 2024

7.5
First published (updated )

IBM InfoSphere Guardium z/OSxmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.

7.5
First published (updated )

IBM InfoSphere Guardium z/OSLast updated 24 July 2024

7.5
First published (updated )

UbuntuUse After Free

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

UbuntuInput Validation

First published (updated )

UbuntuLast updated 24 July 2024

First published (updated )

UbuntuLast updated 24 July 2024

First published (updated )

debian/chromiumHeap buffer overflow in Blink

7.5
First published (updated )

UbuntuNull Pointer Dereference

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203