CVE-2008-4482
https://notcve.org/view.php?id=CVE-2008-4482
The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file. El analizador XML en Xerces-C++ versiones anteriores a 3.0.0, permite a los atacantes dependientes de contexto causar una denegación de servicios (consumo de pila y caída) a través de un esquema de definición XML con un valor largo maxOccurs, el cual lanza un excesivo consumo de memoria durante la validación de un archivo XML. • http://issues.apache.org/jira/browse/XERCESC-1051 http://secunia.com/advisories/32108 http://www.securityfocus.com/bid/31533 http://xerces.apache.org/xerces-c/releases.html https://exchange.xforce.ibmcloud.com/vulnerabilities/45596 • CWE-20: Improper Input Validation •
CVE-2004-1575
https://notcve.org/view.php?id=CVE-2004-1575
The XML parser in Xerces-C++ 2.5.0 allows remote attackers to cause a denial of service (CPU consumption) via XML attributes in a crafted XML document. • http://marc.info/?l=bugtraq&m=109674050017645&w=2 http://secunia.com/advisories/12715 http://www.securityfocus.com/bid/11312 https://exchange.xforce.ibmcloud.com/vulnerabilities/17575 •