Download
| Alert*
oval:org.secpod.oval:def:701031
libxslt: XSLT processing library Applications using libxslt could be made to crash or run programs as your login if they processed a specially crafted file. oval:org.secpod.oval:def:202452 libxslt is a library for transforming XML files into other textual formats using the standard XSLT stylesheet transformation mechanism. A heap-based buffer overflow flaw was found in the way libxslt applied templates to nodes selected by certain namespaces. An attacker could use this flaw to create ... oval:org.secpod.oval:def:202451 libxslt is a library for transforming XML files into other textual formats using the standard XSLT stylesheet transformation mechanism. A heap-based buffer overflow flaw was found in the way libxslt applied templates to nodes selected by certain namespaces. An attacker could use this flaw to create ... oval:org.secpod.oval:def:1601313 A heap-based buffer overflow flaw was found in the way libxslt applied templates to nodes selected by certain namespaces. An attacker could use this flaw to create a malicious XSL file that, when used by an application linked against libxslt to perform an XSL transformation, could cause the applicat ... oval:org.secpod.oval:def:104169 This C library allows to transform XML files into other XML files using the standard XSLT stylesheet transformation mechanism. To use it you need to have a version of libxml2 >= 2.6.27 installed. The xsltproc command is a command line interface to the XSLT engine oval:org.secpod.oval:def:104195 This C library allows to transform XML files into other XML files using the standard XSLT stylesheet transformation mechanism. To use it you need to have a version of libxml2 >= 2.6.27 installed. The xsltproc command is a command line interface to the XSLT engine oval:org.secpod.oval:def:1300009 A vulnerability has been found and corrected in libxslt: libxslt allows remote attackers to cause a denial of service via unspecified vectors . The updated packages have been patched to correct this issue. oval:org.secpod.oval:def:302808 A vulnerability has been found and corrected in libxslt: libxslt allows remote attackers to cause a denial of service via unspecified vectors . The updated packages have been patched to correct this issue. oval:org.secpod.oval:def:4111 The host is installed with Google Chrome before 17.0.963.46 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle libxslt. Successful exploitation allows remote attackers to cause out-of-bounds read. oval:org.secpod.oval:def:4071 The host is installed with Google Chrome before 17.0.963.46 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle libxslt. Successful exploitation allows remote attackers to cause out-of-bounds read. oval:org.secpod.oval:def:4091 The host is installed with Google Chrome before 17.0.963.46 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle libxslt. Successful exploitation allows remote attackers to cause out-of-bounds read. oval:org.secpod.oval:def:4051 The host is installed with Google Chrome before 17.0.963.46 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle libxslt. Successful exploitation allows remote attackers to cause out-of-bounds read. oval:org.secpod.oval:def:1503654 Updated libxslt packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are ... oval:org.secpod.oval:def:500891 libxslt is a library for transforming XML files into other textual formats using the standard XSLT stylesheet transformation mechanism. A heap-based buffer overflow flaw was found in the way libxslt applied templates to nodes selected by certain namespaces. An attacker could use this flaw to create ... |