Lucene search

K

CVE-2013-0339

🗓️ 21 Jan 2014 18:09:55Reported by redhatType 
cve
 cve
🔗 web.nvd.nist.gov👁 90 Views

libxml2 2.9.1 XXE vulnerability allows denial of service and arbitrary file rea

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Refs
Nvd
Node
xmlsoftlibxml2Range2.9.1
OR
xmlsoftlibxml2Match1.7.0
OR
xmlsoftlibxml2Match1.7.1
OR
xmlsoftlibxml2Match1.7.2
OR
xmlsoftlibxml2Match1.7.3
OR
xmlsoftlibxml2Match1.7.4
OR
xmlsoftlibxml2Match1.8.0
OR
xmlsoftlibxml2Match1.8.1
OR
xmlsoftlibxml2Match1.8.2
OR
xmlsoftlibxml2Match1.8.3
OR
xmlsoftlibxml2Match1.8.4
OR
xmlsoftlibxml2Match1.8.5
OR
xmlsoftlibxml2Match1.8.6
OR
xmlsoftlibxml2Match1.8.7
OR
xmlsoftlibxml2Match1.8.9
OR
xmlsoftlibxml2Match1.8.10
OR
xmlsoftlibxml2Match1.8.13
OR
xmlsoftlibxml2Match1.8.14
OR
xmlsoftlibxml2Match1.8.16
OR
xmlsoftlibxml2Match2.0.0
OR
xmlsoftlibxml2Match2.1.0
OR
xmlsoftlibxml2Match2.1.1
OR
xmlsoftlibxml2Match2.2.0
OR
xmlsoftlibxml2Match2.2.0beta
OR
xmlsoftlibxml2Match2.2.1
OR
xmlsoftlibxml2Match2.2.2
OR
xmlsoftlibxml2Match2.2.3
OR
xmlsoftlibxml2Match2.2.4
OR
xmlsoftlibxml2Match2.2.5
OR
xmlsoftlibxml2Match2.2.6
OR
xmlsoftlibxml2Match2.2.7
OR
xmlsoftlibxml2Match2.2.8
OR
xmlsoftlibxml2Match2.2.9
OR
xmlsoftlibxml2Match2.2.10
OR
xmlsoftlibxml2Match2.2.11
OR
xmlsoftlibxml2Match2.3.0
OR
xmlsoftlibxml2Match2.3.1
OR
xmlsoftlibxml2Match2.3.2
OR
xmlsoftlibxml2Match2.3.3
OR
xmlsoftlibxml2Match2.3.4
OR
xmlsoftlibxml2Match2.3.5
OR
xmlsoftlibxml2Match2.3.6
OR
xmlsoftlibxml2Match2.3.7
OR
xmlsoftlibxml2Match2.3.8
OR
xmlsoftlibxml2Match2.3.9
OR
xmlsoftlibxml2Match2.3.10
OR
xmlsoftlibxml2Match2.3.11
OR
xmlsoftlibxml2Match2.3.12
OR
xmlsoftlibxml2Match2.3.13
OR
xmlsoftlibxml2Match2.3.14
OR
xmlsoftlibxml2Match2.4.1
OR
xmlsoftlibxml2Match2.4.2
OR
xmlsoftlibxml2Match2.4.3
OR
xmlsoftlibxml2Match2.4.4
OR
xmlsoftlibxml2Match2.4.5
OR
xmlsoftlibxml2Match2.4.6
OR
xmlsoftlibxml2Match2.4.7
OR
xmlsoftlibxml2Match2.4.8
OR
xmlsoftlibxml2Match2.4.9
OR
xmlsoftlibxml2Match2.4.10
OR
xmlsoftlibxml2Match2.4.11
OR
xmlsoftlibxml2Match2.4.12
OR
xmlsoftlibxml2Match2.4.13
OR
xmlsoftlibxml2Match2.4.14
OR
xmlsoftlibxml2Match2.4.15
OR
xmlsoftlibxml2Match2.4.16
OR
xmlsoftlibxml2Match2.4.17
OR
xmlsoftlibxml2Match2.4.18
OR
xmlsoftlibxml2Match2.4.19
OR
xmlsoftlibxml2Match2.4.20
OR
xmlsoftlibxml2Match2.4.21
OR
xmlsoftlibxml2Match2.4.22
OR
xmlsoftlibxml2Match2.4.23
OR
xmlsoftlibxml2Match2.4.24
OR
xmlsoftlibxml2Match2.4.25
OR
xmlsoftlibxml2Match2.4.26
OR
xmlsoftlibxml2Match2.4.27
OR
xmlsoftlibxml2Match2.4.28
OR
xmlsoftlibxml2Match2.4.29
OR
xmlsoftlibxml2Match2.4.30
OR
xmlsoftlibxml2Match2.5.0
OR
xmlsoftlibxml2Match2.5.4
OR
xmlsoftlibxml2Match2.5.7
OR
xmlsoftlibxml2Match2.5.8
OR
xmlsoftlibxml2Match2.5.10
OR
xmlsoftlibxml2Match2.5.11
OR
xmlsoftlibxml2Match2.6.0
OR
xmlsoftlibxml2Match2.6.1
OR
xmlsoftlibxml2Match2.6.2
OR
xmlsoftlibxml2Match2.6.3
OR
xmlsoftlibxml2Match2.6.4
OR
xmlsoftlibxml2Match2.6.5
OR
xmlsoftlibxml2Match2.6.6
OR
xmlsoftlibxml2Match2.6.7
OR
xmlsoftlibxml2Match2.6.8
OR
xmlsoftlibxml2Match2.6.9
OR
xmlsoftlibxml2Match2.6.11
OR
xmlsoftlibxml2Match2.6.12
OR
xmlsoftlibxml2Match2.6.13
OR
xmlsoftlibxml2Match2.6.14
OR
xmlsoftlibxml2Match2.6.16
OR
xmlsoftlibxml2Match2.6.17
OR
xmlsoftlibxml2Match2.6.18
OR
xmlsoftlibxml2Match2.6.20
OR
xmlsoftlibxml2Match2.6.21
OR
xmlsoftlibxml2Match2.6.22
OR
xmlsoftlibxml2Match2.6.23
OR
xmlsoftlibxml2Match2.6.24
OR
xmlsoftlibxml2Match2.6.25
OR
xmlsoftlibxml2Match2.6.26
OR
xmlsoftlibxml2Match2.6.27
OR
xmlsoftlibxml2Match2.6.28
OR
xmlsoftlibxml2Match2.6.29
OR
xmlsoftlibxml2Match2.6.30
OR
xmlsoftlibxml2Match2.6.31
OR
xmlsoftlibxml2Match2.6.32
OR
xmlsoftlibxml2Match2.7.0
OR
xmlsoftlibxml2Match2.7.1
OR
xmlsoftlibxml2Match2.7.2
OR
xmlsoftlibxml2Match2.7.3
OR
xmlsoftlibxml2Match2.7.4
OR
xmlsoftlibxml2Match2.7.5
OR
xmlsoftlibxml2Match2.7.6
OR
xmlsoftlibxml2Match2.7.7
OR
xmlsoftlibxml2Match2.7.8
OR
xmlsoftlibxml2Match2.8.0
OR
xmlsoftlibxml2Match2.9.0
OR
xmlsoftlibxml2Match2.9.0rc1

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
21 Jan 2014 18:55Current
9High risk
Vulners AI Score9
CVSS26.8
EPSS0.01783
90
.json
Report