2 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 18EXPL: 1

The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file. El analizador XML en Xerces-C++ versiones anteriores a 3.0.0, permite a los atacantes dependientes de contexto causar una denegación de servicios (consumo de pila y caída) a través de un esquema de definición XML con un valor largo maxOccurs, el cual lanza un excesivo consumo de memoria durante la validación de un archivo XML. • http://issues.apache.org/jira/browse/XERCESC-1051 http://secunia.com/advisories/32108 http://www.securityfocus.com/bid/31533 http://xerces.apache.org/xerces-c/releases.html https://exchange.xforce.ibmcloud.com/vulnerabilities/45596 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The XML parser in Xerces-C++ 2.5.0 allows remote attackers to cause a denial of service (CPU consumption) via XML attributes in a crafted XML document. • http://marc.info/?l=bugtraq&m=109674050017645&w=2 http://secunia.com/advisories/12715 http://www.securityfocus.com/bid/11312 https://exchange.xforce.ibmcloud.com/vulnerabilities/17575 •