CVE-2012-2807
27.06.2012, 10:18
Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.Enginsight
Vendor | Product | Version |
---|---|---|
chrome | 𝑥 ≤ 20.0.1132.42 | |
chrome | 20.0.1132.0 | |
chrome | 20.0.1132.1 | |
chrome | 20.0.1132.2 | |
chrome | 20.0.1132.3 | |
chrome | 20.0.1132.4 | |
chrome | 20.0.1132.5 | |
chrome | 20.0.1132.6 | |
chrome | 20.0.1132.7 | |
chrome | 20.0.1132.8 | |
chrome | 20.0.1132.9 | |
chrome | 20.0.1132.10 | |
chrome | 20.0.1132.11 | |
chrome | 20.0.1132.12 | |
chrome | 20.0.1132.13 | |
chrome | 20.0.1132.14 | |
chrome | 20.0.1132.15 | |
chrome | 20.0.1132.16 | |
chrome | 20.0.1132.17 | |
chrome | 20.0.1132.18 | |
chrome | 20.0.1132.19 | |
chrome | 20.0.1132.20 | |
chrome | 20.0.1132.21 | |
chrome | 20.0.1132.22 | |
chrome | 20.0.1132.23 | |
chrome | 20.0.1132.24 | |
chrome | 20.0.1132.25 | |
chrome | 20.0.1132.26 | |
chrome | 20.0.1132.27 | |
chrome | 20.0.1132.28 | |
chrome | 20.0.1132.29 | |
chrome | 20.0.1132.30 | |
chrome | 20.0.1132.31 | |
chrome | 20.0.1132.32 | |
chrome | 20.0.1132.33 | |
chrome | 20.0.1132.34 | |
chrome | 20.0.1132.35 | |
chrome | 20.0.1132.36 | |
chrome | 20.0.1132.37 | |
chrome | 20.0.1132.38 | |
chrome | 20.0.1132.39 | |
chrome | 20.0.1132.40 | |
chrome | 20.0.1132.41 | |
apple | iphone_os | 𝑥 ≤ 6.1.4 |
apple | iphone_os | 1.0.0 |
apple | iphone_os | 1.0.1 |
apple | iphone_os | 1.0.2 |
apple | iphone_os | 1.1.0 |
apple | iphone_os | 1.1.1 |
apple | iphone_os | 1.1.2 |
apple | iphone_os | 1.1.3 |
apple | iphone_os | 1.1.4 |
apple | iphone_os | 1.1.5 |
apple | iphone_os | 2.0 |
apple | iphone_os | 2.0.0 |
apple | iphone_os | 2.0.1 |
apple | iphone_os | 2.0.2 |
apple | iphone_os | 2.1 |
apple | iphone_os | 2.1.1 |
apple | iphone_os | 2.2 |
apple | iphone_os | 2.2.1 |
apple | iphone_os | 3.0 |
apple | iphone_os | 3.0.1 |
apple | iphone_os | 3.1 |
apple | iphone_os | 3.1.2 |
apple | iphone_os | 3.1.3 |
apple | iphone_os | 3.2 |
apple | iphone_os | 3.2.1 |
apple | iphone_os | 3.2.2 |
apple | iphone_os | 4.0 |
apple | iphone_os | 4.0.1 |
apple | iphone_os | 4.0.2 |
apple | iphone_os | 4.1 |
apple | iphone_os | 4.2.1 |
apple | iphone_os | 4.2.5 |
apple | iphone_os | 4.2.8 |
apple | iphone_os | 4.3.0 |
apple | iphone_os | 4.3.1 |
apple | iphone_os | 4.3.2 |
apple | iphone_os | 4.3.3 |
apple | iphone_os | 4.3.5 |
apple | iphone_os | 5.0 |
apple | iphone_os | 5.0.1 |
apple | iphone_os | 5.1 |
apple | iphone_os | 5.1.1 |
apple | iphone_os | 6.0 |
apple | iphone_os | 6.0.1 |
apple | iphone_os | 6.0.2 |
apple | iphone_os | 6.1 |
apple | iphone_os | 6.1.2 |
apple | iphone_os | 6.1.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References