Apache Software Foundation Xerces-C++ 1.0.1

CPE Details

Apache Software Foundation Xerces-C++ 1.0.1
1.0.1
2008-10-08
13h31 +00:00
2008-10-08
13h31 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:apache:xerces-c\+\+:1.0.1:*:*:*:*:*:*:*

Informations

Vendor

apache

Product

xerces-c\+\+

Version

1.0.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2017-12627 2018-03-01 14h00 +00:00 In Apache Xerces-C XML Parser library before 3.2.1, processing of external DTD paths can result in a null pointer dereference under certain conditions.
9.8
Critique
CVE-2016-4463 2016-07-08 17h00 +00:00 Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
7.5
Haute
CVE-2016-2099 2016-05-13 12h00 +00:00 Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
9.8
Critique
CVE-2015-0252 2015-03-24 16h00 +00:00 internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
5
CVE-2008-4482 2008-10-07 23h00 +00:00 The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
7.8