Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libxslt vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2011-1202
The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and previous versions, as used in Google Chrome prior to 10.0.648.127 and other products, allows remote malicious users to obtain potentially sensitive information about heap memory addresses via an XML document...
Google Chrome
Xmlsoft Libxslt
7.5
CVSSv2
CVE-2008-2935
Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 up to and including 1.1.24 allow context-dependent malicious users to execu...
Xmlsoft Libxslt 1.1.10
Xmlsoft Libxslt 1.1.11
Xmlsoft Libxslt 1.1.19
Xmlsoft Libxslt 1.1.20
Xmlsoft Libxslt 1.1.14
Xmlsoft Libxslt 1.1.15
Xmlsoft Libxslt 1.1.16
Xmlsoft Libxslt 1.1.23
Xmlsoft Libxslt 1.1.24
Xmlsoft Libxslt 1.1.12
Xmlsoft Libxslt 1.1.13
Xmlsoft Libxslt 1.1.21
Xmlsoft Libxslt 1.1.22
Xmlsoft Libxslt 1.1.17
Xmlsoft Libxslt 1.1.18
Xmlsoft Libxslt 1.1.8
Xmlsoft Libxslt 1.1.9
1 EDB exploit
7.5
CVSSv2
CVE-2008-1767
Buffer overflow in pattern.c in libxslt prior to 1.1.24 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large ...
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop Workstation 5
Redhat Linux Advanced Workstation 2.1
Redhat Desktop 3
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux Desktop 4
Redhat Enterprise Linux Desktop 5
Redhat Enterprise Linux 5.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7