Vulnerabilities
Vulnerable Software
Apache:  >> Xerces-C++  >> 1.6.0  Security Vulnerabilities
In Apache Xerces-C XML Parser library before 3.2.1, processing of external DTD paths can result in a null pointer dereference under certain conditions.
CVSS Score
9.8
EPSS Score
0.016
Published
2018-03-01
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
CVSS Score
7.5
EPSS Score
0.335
Published
2016-07-08
Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
CVSS Score
9.8
EPSS Score
0.029
Published
2016-05-13
internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
CVSS Score
5.0
EPSS Score
0.267
Published
2015-03-24
The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
CVSS Score
7.8
EPSS Score
0.02
Published
2008-10-08


Contact Us

Shodan ® - All rights reserved