Apache Software Foundation Xerces-c++ 3.2.3

CPE Details

Apache Software Foundation Xerces-c++ 3.2.3
3.2.3
2023-02-05
20h06 +00:00
2023-02-05
20h10 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:apache:xerces-c\+\+:3.2.3:*:*:*:*:*:*:*

Informations

Vendor

apache

Product

xerces-c\+\+

Version

3.2.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-23807 2024-02-28 13h50 +00:00 The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs. Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable. This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4.
9.8
Critical
CVE-2023-37536 2023-10-11 06h46 +00:00 An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request.
8.8
High
CVE-2018-1311 2019-12-17 23h00 +00:00 The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
8.1
High