Total vulnerabilities in the database
Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 7.0 | 7.0.x |
debian / debian_linux | 9.0 | 9.0.x |
google / chrome | - | 63.0.3239.84 |
xmlsoft / libxml2 | - | 2.9.5 |