Total vulnerabilities in the database
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
Software | From | Fixed in |
---|---|---|
xmlsoft / libxml2 | - | 2.13.8 |
xmlsoft / libxml2 | 2.14.0 | 2.14.2 |