Total vulnerabilities in the database
Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
Software | From | Fixed in |
---|---|---|
google / chrome | - | 52.0.2743.82 |
xmlsoft / libxml2 | - | 2.9.4.x |
apple / watchos | - | 3.0 |
apple / tvos | - | 10.0 |
apple / iphone_os | - | 10.0 |
apple / mac_os_x | - | 10.12 |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
suse / linux_enterprise | 12.0 | 12.0.x |
opensuse / leap | 42.1 | 42.1.x |
opensuse / opensuse | 13.1 | 13.1.x |
opensuse / opensuse | 13.2 | 13.2.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |