Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2016-4463
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.335
EPSS Ranking
96.6%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html
http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html
http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/archive/1/538784/100/0/threaded
http://www.securityfocus.com/bid/91501
http://www.securitytracker.com/id/1036211
http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt
https://access.redhat.com/errata/RHSA-2018:3335
https://access.redhat.com/errata/RHSA-2018:3506
https://access.redhat.com/errata/RHSA-2018:3514
https://issues.apache.org/jira/browse/XERCESC-2069
https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069
https://www.debian.org/security/2016/dsa-3610
https://www.oracle.com/security-alerts/cpuapr2020.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html
http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html
http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/archive/1/538784/100/0/threaded
http://www.securityfocus.com/bid/91501
http://www.securitytracker.com/id/1036211
http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt
https://access.redhat.com/errata/RHSA-2018:3335
https://access.redhat.com/errata/RHSA-2018:3506
https://access.redhat.com/errata/RHSA-2018:3514
https://issues.apache.org/jira/browse/XERCESC-2069
https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069
https://www.debian.org/security/2016/dsa-3610
https://www.oracle.com/security-alerts/cpuapr2020.html
Products affected by CVE-2016-4463
Apache
»
Xerces-C++
»
Version:
N/A
cpe:2.3:a:apache:xerces-c++:-
Apache
»
Xerces-C++
»
Version:
1.0.0
cpe:2.3:a:apache:xerces-c++:1.0.0
Apache
»
Xerces-C++
»
Version:
1.0.1
cpe:2.3:a:apache:xerces-c++:1.0.1
Apache
»
Xerces-C++
»
Version:
1.1.0
cpe:2.3:a:apache:xerces-c++:1.1.0
Apache
»
Xerces-C++
»
Version:
1.2.0
cpe:2.3:a:apache:xerces-c++:1.2.0
Apache
»
Xerces-C++
»
Version:
1.3.0
cpe:2.3:a:apache:xerces-c++:1.3.0
Apache
»
Xerces-C++
»
Version:
1.4.0
cpe:2.3:a:apache:xerces-c++:1.4.0
Apache
»
Xerces-C++
»
Version:
1.5.0
cpe:2.3:a:apache:xerces-c++:1.5.0
Apache
»
Xerces-C++
»
Version:
1.5.1
cpe:2.3:a:apache:xerces-c++:1.5.1
Apache
»
Xerces-C++
»
Version:
1.5.2
cpe:2.3:a:apache:xerces-c++:1.5.2
Apache
»
Xerces-C++
»
Version:
1.6.0
cpe:2.3:a:apache:xerces-c++:1.6.0
Apache
»
Xerces-C++
»
Version:
1.7.0
cpe:2.3:a:apache:xerces-c++:1.7.0
Apache
»
Xerces-C++
»
Version:
2.0.0
cpe:2.3:a:apache:xerces-c++:2.0.0
Apache
»
Xerces-C++
»
Version:
2.1.0
cpe:2.3:a:apache:xerces-c++:2.1.0
Apache
»
Xerces-C++
»
Version:
2.2.0
cpe:2.3:a:apache:xerces-c++:2.2.0
Apache
»
Xerces-C++
»
Version:
2.3.0
cpe:2.3:a:apache:xerces-c++:2.3.0
Apache
»
Xerces-C++
»
Version:
2.4.0
cpe:2.3:a:apache:xerces-c++:2.4.0
Apache
»
Xerces-C++
»
Version:
2.5.0
cpe:2.3:a:apache:xerces-c++:2.5.0
Apache
»
Xerces-C++
»
Version:
2.6.0
cpe:2.3:a:apache:xerces-c++:2.6.0
Apache
»
Xerces-C++
»
Version:
2.7.0
cpe:2.3:a:apache:xerces-c++:2.7.0
Apache
»
Xerces-C++
»
Version:
2.8.0
cpe:2.3:a:apache:xerces-c++:2.8.0
Apache
»
Xerces-C++
»
Version:
3.0.0
cpe:2.3:a:apache:xerces-c++:3.0.0
Apache
»
Xerces-C++
»
Version:
3.0.1
cpe:2.3:a:apache:xerces-c++:3.0.1
Apache
»
Xerces-C++
»
Version:
3.1.0
cpe:2.3:a:apache:xerces-c++:3.1.0
Apache
»
Xerces-C++
»
Version:
3.1.1
cpe:2.3:a:apache:xerces-c++:3.1.1
Apache
»
Xerces-C++
»
Version:
3.1.2
cpe:2.3:a:apache:xerces-c++:3.1.2
Apache
»
Xerces-C++
»
Version:
3.1.3
cpe:2.3:a:apache:xerces-c++:3.1.3
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved