mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
38 lines
1.7 KiB
Markdown
38 lines
1.7 KiB
Markdown
![]() |
### [CVE-2018-14404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xfabiof/aws_inspector_parser
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/DanielEbert/winafl
|
||
|
- https://github.com/KorayAgaya/TrivyWeb
|
||
|
- https://github.com/Mohzeela/external-secret
|
||
|
- https://github.com/Team-BT5/WinAFL-RDP
|
||
|
- https://github.com/bacon-tomato-spaghetti/WinAFL-RDP
|
||
|
- https://github.com/chaojianhu/winafl-intelpt
|
||
|
- https://github.com/googleprojectzero/winafl
|
||
|
- https://github.com/hardik05/winafl-powermopt
|
||
|
- https://github.com/lacework/up-and-running-packer
|
||
|
- https://github.com/laws-africa/slaw
|
||
|
- https://github.com/pranav0408/WinAFL
|
||
|
- https://github.com/s0i37/winafl_inmemory
|
||
|
- https://github.com/scottford-lw/up-and-running-packer
|
||
|
- https://github.com/siddharthraopotukuchi/trivy
|
||
|
- https://github.com/simiyo/trivy
|
||
|
- https://github.com/ssumachai/CS182-Project
|
||
|
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
|
||
|
- https://github.com/umahari/security
|
||
|
- https://github.com/yrime/WinAflCustomMutate
|
||
|
|