Apache Software Foundation Xerces-C++ 2.0.0

CPE Details

Apache Software Foundation Xerces-C++ 2.0.0
2.0.0
2008-10-08
13h31 +00:00
2008-10-08
13h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:apache:xerces-c\+\+:2.0.0:*:*:*:*:*:*:*

Informations

Vendor

apache

Product

xerces-c\+\+

Version

2.0.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2017-12627 2018-03-01 14h00 +00:00 In Apache Xerces-C XML Parser library before 3.2.1, processing of external DTD paths can result in a null pointer dereference under certain conditions.
9.8
Critical
CVE-2016-4463 2016-07-08 17h00 +00:00 Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
7.5
High
CVE-2016-2099 2016-05-13 12h00 +00:00 Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
9.8
Critical
CVE-2015-0252 2015-03-24 16h00 +00:00 internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
5
CVE-2008-4482 2008-10-07 23h00 +00:00 The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
7.8