Total vulnerabilities in the database
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
Software | From | Fixed in |
---|---|---|
libexpat_project / libexpat | - | 2.2.7 |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 18.10 | 18.10.x |
canonical / ubuntu_linux | 19.04 | 19.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |
fedoraproject / fedora | 29 | 29.x |
fedoraproject / fedora | 30 | 30.x |
opensuse / leap | 15.0 | 15.0.x |
opensuse / leap | 15.1 | 15.1.x |
oracle / http_server | 12.1.3.0 | 12.1.3.0.x |
oracle / outside_in_technology | 8.5.4 | 8.5.4.x |
oracle / outside_in_technology | 8.5.5 | 8.5.5.x |
oracle / http_server | 12.2.1.4.0 | 12.2.1.4.0.x |
oracle / hospitality_res_3700 | 5.7 | 5.7.6.x |
tenable / nessus | - | 8.15.0 |