Vulnerabilities > Apache > Xerces C > 1.5.2

DATE CVE VULNERABILITY TITLE RISK
2018-03-01 CVE-2017-12627 NULL Pointer Dereference vulnerability in Apache Xerces-C++
In Apache Xerces-C XML Parser library before 3.2.1, processing of external DTD paths can result in a null pointer dereference under certain conditions.
network
low complexity
apache CWE-476
7.5
2016-07-08 CVE-2016-4463 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
network
low complexity
apache debian CWE-119
7.5
2016-05-13 CVE-2016-2099 Use-After-Free Remote Code Execution vulnerability in Apache Xerces
Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
network
low complexity
apache opensuse
critical
10.0
2008-10-08 CVE-2008-4482 Improper Input Validation vulnerability in Apache Xerces-C++
The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
network
low complexity
apache CWE-20
7.8