cve/2018/CVE-2018-14404.md

38 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-14404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xfabiof/aws_inspector_parser
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DanielEbert/winafl
- https://github.com/KorayAgaya/TrivyWeb
- https://github.com/Mohzeela/external-secret
- https://github.com/Team-BT5/WinAFL-RDP
- https://github.com/bacon-tomato-spaghetti/WinAFL-RDP
- https://github.com/chaojianhu/winafl-intelpt
- https://github.com/googleprojectzero/winafl
- https://github.com/hardik05/winafl-powermopt
- https://github.com/lacework/up-and-running-packer
- https://github.com/laws-africa/slaw
- https://github.com/pranav0408/WinAFL
- https://github.com/s0i37/winafl_inmemory
- https://github.com/scottford-lw/up-and-running-packer
- https://github.com/siddharthraopotukuchi/trivy
- https://github.com/simiyo/trivy
- https://github.com/ssumachai/CS182-Project
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
- https://github.com/umahari/security
- https://github.com/yrime/WinAflCustomMutate