rpm package
suse/expat&distro=SUSE Linux Enterprise Server 11 SP4
pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4
Vulnerabilities (6)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-9063 | — | < 2.0.1-88.42.3.2 | 2.0.1-88.42.3.2 | Jun 11, 2018 | An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50. | ||
| CVE-2017-9233 | Hig | 7.5 | < 2.0.1-88.42.3.2 | 2.0.1-88.42.3.2 | Jul 25, 2017 | XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD. | |
| CVE-2016-5300 | Hig | 7.5 | < 2.0.1-88.41.1 | 2.0.1-88.41.1 | Jun 16, 2016 | The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for C | |
| CVE-2012-6702 | Med | 5.9 | < 2.0.1-88.41.1 | 2.0.1-88.41.1 | Jun 16, 2016 | Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function. | |
| CVE-2016-0718 | Cri | 9.8 | < 2.0.1-88.38.1 | 2.0.1-88.38.1 | May 26, 2016 | Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. | |
| CVE-2015-1283 | — | < 2.0.1-88.38.1 | 2.0.1-88.38.1 | Jul 23, 2015 | Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted |
- CVE-2016-9063Jun 11, 2018affected < 2.0.1-88.42.3.2fixed 2.0.1-88.42.3.2
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
- affected < 2.0.1-88.42.3.2fixed 2.0.1-88.42.3.2
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
- affected < 2.0.1-88.41.1fixed 2.0.1-88.41.1
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for C
- affected < 2.0.1-88.41.1fixed 2.0.1-88.41.1
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
- affected < 2.0.1-88.38.1fixed 2.0.1-88.38.1
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
- CVE-2015-1283Jul 23, 2015affected < 2.0.1-88.38.1fixed 2.0.1-88.38.1
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted