cve-2012-5134
Vulnerability from cvelistv5
Published
2012-11-28 01:00
Modified
2024-08-06 20:58
Severity ?
Summary
Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
References
chrome-cve-admin@google.comhttp://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d
chrome-cve-admin@google.comhttp://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html
chrome-cve-admin@google.comhttp://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
chrome-cve-admin@google.comhttp://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html
chrome-cve-admin@google.comhttp://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
chrome-cve-admin@google.comhttp://rhn.redhat.com/errata/RHSA-2012-1512.html
chrome-cve-admin@google.comhttp://rhn.redhat.com/errata/RHSA-2013-0217.html
chrome-cve-admin@google.comhttp://secunia.com/advisories/51448
chrome-cve-admin@google.comhttp://secunia.com/advisories/54886
chrome-cve-admin@google.comhttp://secunia.com/advisories/55568
chrome-cve-admin@google.comhttp://support.apple.com/kb/HT5934
chrome-cve-admin@google.comhttp://support.apple.com/kb/HT6001
chrome-cve-admin@google.comhttp://www.debian.org/security/2012/dsa-2580
chrome-cve-admin@google.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:056
chrome-cve-admin@google.comhttp://www.securityfocus.com/bid/56684
chrome-cve-admin@google.comhttp://www.securitytracker.com/id?1027815
chrome-cve-admin@google.comhttp://www.ubuntu.com/usn/USN-1656-1
chrome-cve-admin@google.comhttps://bugzilla.redhat.com/show_bug.cgi?id=880466
chrome-cve-admin@google.comhttps://code.google.com/p/chromium/issues/detail?id=158249
chrome-cve-admin@google.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/80294
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d
af854a3a-2127-422b-91ae-364da2661108http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-1512.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0217.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51448
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54886
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55568
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5934
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT6001
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2580
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/56684
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1027815
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1656-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=880466
af854a3a-2127-422b-91ae-364da2661108https://code.google.com/p/chromium/issues/detail?id=158249
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/80294
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:58:02.682Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880466"
          },
          {
            "name": "APPLE-SA-2013-10-22-8",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html"
          },
          {
            "name": "SUSE-SU-2013:1627",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html"
          },
          {
            "name": "openSUSE-SU-2012:1637",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html"
          },
          {
            "name": "RHSA-2013:0217",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
          },
          {
            "name": "USN-1656-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1656-1"
          },
          {
            "name": "DSA-2580",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2580"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT6001"
          },
          {
            "name": "google-libxml-buffer-underflow(80294)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80294"
          },
          {
            "name": "1027815",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1027815"
          },
          {
            "name": "54886",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54886"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5934"
          },
          {
            "name": "openSUSE-SU-2013:0178",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html"
          },
          {
            "name": "RHSA-2012:1512",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-1512.html"
          },
          {
            "name": "55568",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55568"
          },
          {
            "name": "56684",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56684"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d"
          },
          {
            "name": "MDVSA-2013:056",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:056"
          },
          {
            "name": "51448",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51448"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/chromium/issues/detail?id=158249"
          },
          {
            "name": "APPLE-SA-2013-09-18-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
        "shortName": "Chrome"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880466"
        },
        {
          "name": "APPLE-SA-2013-10-22-8",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html"
        },
        {
          "name": "SUSE-SU-2013:1627",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html"
        },
        {
          "name": "openSUSE-SU-2012:1637",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html"
        },
        {
          "name": "RHSA-2013:0217",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
        },
        {
          "name": "USN-1656-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1656-1"
        },
        {
          "name": "DSA-2580",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2580"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT6001"
        },
        {
          "name": "google-libxml-buffer-underflow(80294)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80294"
        },
        {
          "name": "1027815",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1027815"
        },
        {
          "name": "54886",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54886"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5934"
        },
        {
          "name": "openSUSE-SU-2013:0178",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html"
        },
        {
          "name": "RHSA-2012:1512",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-1512.html"
        },
        {
          "name": "55568",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55568"
        },
        {
          "name": "56684",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56684"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d"
        },
        {
          "name": "MDVSA-2013:056",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:056"
        },
        {
          "name": "51448",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51448"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/chromium/issues/detail?id=158249"
        },
        {
          "name": "APPLE-SA-2013-09-18-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@google.com",
          "ID": "CVE-2012-5134",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=880466",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880466"
            },
            {
              "name": "APPLE-SA-2013-10-22-8",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html"
            },
            {
              "name": "SUSE-SU-2013:1627",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html"
            },
            {
              "name": "openSUSE-SU-2012:1637",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html"
            },
            {
              "name": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html",
              "refsource": "CONFIRM",
              "url": "http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html"
            },
            {
              "name": "RHSA-2013:0217",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
            },
            {
              "name": "USN-1656-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1656-1"
            },
            {
              "name": "DSA-2580",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2580"
            },
            {
              "name": "http://support.apple.com/kb/HT6001",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT6001"
            },
            {
              "name": "google-libxml-buffer-underflow(80294)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80294"
            },
            {
              "name": "1027815",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1027815"
            },
            {
              "name": "54886",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54886"
            },
            {
              "name": "http://support.apple.com/kb/HT5934",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT5934"
            },
            {
              "name": "openSUSE-SU-2013:0178",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html"
            },
            {
              "name": "RHSA-2012:1512",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2012-1512.html"
            },
            {
              "name": "55568",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55568"
            },
            {
              "name": "56684",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/56684"
            },
            {
              "name": "http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d"
            },
            {
              "name": "MDVSA-2013:056",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:056"
            },
            {
              "name": "51448",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/51448"
            },
            {
              "name": "https://code.google.com/p/chromium/issues/detail?id=158249",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/chromium/issues/detail?id=158249"
            },
            {
              "name": "APPLE-SA-2013-09-18-2",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
    "assignerShortName": "Chrome",
    "cveId": "CVE-2012-5134",
    "datePublished": "2012-11-28T01:00:00",
    "dateReserved": "2012-09-24T00:00:00",
    "dateUpdated": "2024-08-06T20:58:02.682Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-5134\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2012-11-28T01:55:01.323\",\"lastModified\":\"2024-11-21T01:44:06.940\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en memoria din\u00e1mica  en la funci\u00f3n xmlParseAttValueComplex en parser.c en libxml2 2.9.0 y anteriores, como las usadas en Google Chrome anteriores a 23.0.1271.91,permite a atacantes remotos causar una denegaci\u00f3n de servicio (cuelgue) o ejecutar c\u00f3digo a trav\u00e9s de una entidad manipulada en un fichero XML.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"23.0.1271.89\",\"matchCriteriaId\":\"E9CA104F-8116-45B2-B98B-263B012D460E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C3F2AC-D9A8-48BB-A207-30A8F118BF28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B15707-7C97-48A4-9F20-EC786BDF13C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14FF6845-B328-4E73-83EB-74860C5EB8EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8423F18-4875-4ABE-AC80-57340305D91F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8B4DEA-C174-4E9E-85CF-E7E78C7D87BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10C06A20-E967-4879-BEDE-DCA1314DF81E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F721A6BE-FBB8-49EA-8C12-AF341C275C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BC8404-7EDD-4B34-92DF-77CABE12CA28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B7CBF0-47D3-4567-8F3A-648D5107DD79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"121C4953-953D-47D0-9D66-D0B69AC28831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4AB366A-A3DD-4DAF-A041-720C526C03AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E21A142-3481-43B9-9395-7F48AF784463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18DCFA28-1766-40A8-AB2D-1F99ECAF3F28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D0C147B-6B25-48AE-ACC9-6DAB12560290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31E62C0B-6FDE-4462-9E9B-7E78A7283705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"359D25B5-BEED-40C0-9CC2-CCD0D45FDFCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC860EB3-EB61-421E-B494-6830337F3CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"386ED915-8B2A-428D-A825-B814C1B2D7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FE3859-CBE2-4A47-BE29-1EB193B21E8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4844D01-3562-469A-B98E-FA29E42A1A3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28981813-AC63-4D44-BE1E-4E2F9EB6C9E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C13124B6-7FE5-4047-88D2-88B7FD7BA389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D91B54DA-001B-4231-A102-F328D86AA656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04DDC74C-D04A-4C44-A597-3AC873A5290F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E16EDD52-B5EF-4E66-AC94-39AEA3A008C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6E1AEE-FB1E-4A2A-9BBD-2EE3BD5BDF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"966F5E5C-C56E-44F4-B76B-D5CA9E2BAF3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3E1BF3-BA52-46B2-87D4-E0A473D2F65C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"159EF5CD-0E22-4AC3-A14A-A0931AF5D8EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD966311-A0DE-4554-984C-1C175E411BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E316E65-EFA7-428F-BA83-B29E019DE1C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD447C2-6789-4EDC-AEFD-830AA3B653F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9661CBA-A581-454A-A923-19C3CDFE6391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2437082-6AA3-4CBD-895C-CA14463D831D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215F3C35-D1CD-44FE-A62A-4BCBACE52587\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58D66B4A-FBC8-4017-9E32-490AF9298716\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7258FEEE-B85C-4923-B60D-9B327DA92047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E9516A-A3DC-4B1C-BF56-5A4406E5468E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B4D20A-E3A2-493B-89F5-E6BBE37B19CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A08B0A1B-6E9E-4A71-9506-574BFA1C10CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B974908F-B63B-4EDC-B3EA-C52FD638C957\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3B2E0A1-79C8-4C8D-BFD8-1C7BE9988E2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E32E86F-09A0-4CE3-BF9C-C140A0539D4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C12838-19AA-44CD-879D-39036C107874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDFC93DA-4AB3-44C4-AB6F-F373A8C24F67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1FD770-6EA3-4348-9D6C-537EDEDA5F3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137C6B9C-E81A-48EA-8E6D-842D444180B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16515194-DAE1-4F9E-8091-1D0C8A3C0BCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FB1B004-0CBF-41F1-96E9-E02A6C3745E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"257C675B-398B-4E68-999A-39454845B07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"549E9049-23C4-49F0-BA34-062DA14A5970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0951860F-83CD-47A7-951F-2C93A53E9098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D41B4E-275D-4CAE-8165-31EA30DB8B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F9EFE67-FA32-448B-B10A-D68EE04D2E66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB7CD1B-5FD0-4BE5-9056-35A380BFF087\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49F73AE2-B1F5-47B7-AEEA-A2810833D8D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"679A878A-0934-4D3C-BC2F-C6FE334D590F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB90E306-4BA6-473B-B39F-ED4DB7B2D724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E517092-8323-41D2-A779-251F60B0B53C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.9.0\",\"matchCriteriaId\":\"47270C45-F272-42F6-8E5F-3D92684100E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2524F0A-AC51-44CB-A4ED-09B70C7E19A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569432A3-3145-40CD-BFA8-6B70BE47F3E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9635F852-0577-45F6-A301-8DF8108860A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E409CD-F17C-4A1F-8F84-5E495B2D4652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08C8CA8-9F4E-4591-9DDC-C1102F691647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E973C066-2745-49B5-9FDA-CCD6CE0633B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8070C75-15A8-4A9D-AA0F-4D92CC2691ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EDF7C8-50C8-4A20-975E-06B2D528E2B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE252FCD-647B-4586-A8EC-6BB095BB3E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5291EC59-4016-40B3-BF08-292080D19243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A84CCC4-6F7E-4563-AE45-AF6B45A7D1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2E74FC5-77EE-42A9-B2F7-6C4FC2F0CD20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADFC1E5-2F83-484B-852B-D71B7D1C5A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2779B6F-AA9F-4D2D-9DD1-9BC9A9042DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B172A659-DC83-483D-8DBE-637E89DF3DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3FD4D7C-1826-4BC9-BCEA-6FB8D7738D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52800CB4-6389-4AB0-A098-8F465CF4A733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D499267-5C14-4888-92C7-2ECE909BD9F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"586C0FAB-E288-4EFB-8946-4535971F23F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15236DDC-0095-4253-9113-61F76EFC0769\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98F95AB1-D3D0-4E39-B135-4B55991845CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392E4AA7-00D2-45B1-9FA7-C1C7C37431F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7839A86-59AA-400C-BF29-18E612B8EB4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F9A211A-5C44-4BDC-9676-3B7B937835B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BECA085A-BEF1-4AD2-ABBA-069CE2642796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66BF7BC-5B5C-40BB-B826-3CC9DBAB53D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F330D609-31EB-4B4C-B007-ACEABA557F54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E2F05B-B298-489C-9E44-62E0A199E148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070B2F1F-9A99-4A20-9BA9-CF175D482DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25DC5AE4-9DEA-4828-96F0-57BACB6C9B25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE26E6D-53FF-4001-8F25-C112635CB74E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1210A8D-5359-4FD4-963F-506200AA20AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA748E50-798F-40EA-B252-0A166DEEB120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B9E7CC-D552-4C9A-909E-42D375452E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C20B5C-16E7-4C1B-A2DB-8EB4B9A7045D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A901B3-B0F4-4D2B-8CAF-25938219B657\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FCBA01-D739-4BA2-83F5-D41A6DF91F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC8C43D-84C7-4C0C-8DD1-66206D665C35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E60C1B4-BBC1-4E2B-8323-A7E059EF6BEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B677850-4FE9-4522-ADAE-42C5D17D4A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB7931B-55AA-4735-8AAB-9F3A9E9C0123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A5B9AF-7F82-4EEC-A776-587C6DD44448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94D33392-DD5C-4704-BECF-69D416F9F2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1BA896F-07D7-4B93-939B-B6CDD1DCA87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647CA5AD-5AC2-448E-8445-62837F413361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37D4241B-A328-45F0-9FAB-CEE20DC7432E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAAD77C4-84EC-4924-90F8-35A2375AA6A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A124C5A-C72C-4623-925E-378FF40671EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ACD2FD4-E884-4FC5-842B-86AAE06D9E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14A9036D-1474-4097-9E70-09F7BBA2826C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8884CF6-2F5B-465F-841B-3C69EC3BE3BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A699B966-3756-4D5B-8693-0678EEDD8AD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1E50FED-4BAD-4D04-98C3-C2427E086C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70880522-BBC0-4D5C-8DA3-245E189FA1C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A8BA1A0-F8E7-4B93-B667-D012C91F831E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27662848-9CD5-43BC-9A1B-8C6EBACCCC21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C967E50C-E7AA-49D0-A055-20CA083CA232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA398ACA-73C2-4093-AD35-E30161C96C25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757B5A74-6B7B-4F01-9891-9F9E510074C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C10CC4C-3A9C-4AD0-A7C1-ACF781BF20D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E67FD94-4E96-4FCC-990B-4C0A5C599ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E7DDE27-9DE8-4E45-AFA2-AFFEA8F0D917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92CEEDA7-5DFC-4DB0-989E-F356E5CF65A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D60B58-3558-4244-A5B3-8D16F53A9588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5DB409B-795F-4F8A-85E1-0B4E66AE9D48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"457C47ED-A429-42AE-9FF9-978D605BACFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C20B9D5-9E10-4B6D-8095-B2A63EDB8D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9087E4FE-661F-4803-BB3B-09D2699265E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2D01CF-9FCE-41F8-997E-EA9BDCCD8C76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E1C7A6-DCA7-4760-B1B6-EFB256978CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F1E7CFF-E4B3-4B31-BE23-C187544E9488\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81EDD077-5183-4588-8DB1-93A0597AAA34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"530FE28C-0D51-4BF9-AE43-D65F9913B48B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F030053E-2292-42E2-8435-0CFBDDE688DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0258377-DD8B-4FA6-B075-E8489C83CEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E0BD23-38C6-43C0-870F-00B13F7C91D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D3350E-5186-4DC8-9D1B-59068A469496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76783D0-63F8-48A7-85FE-E5E8DBFA223D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52AE89B2-C1A3-48C8-AEB5-4B0D757AE361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ACA170D-21DB-47CD-AD73-2DEB2A2439F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC48A66-7D1F-4446-BC50-6C1A1DF819E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A86D90-C64E-4850-8D6E-94D3C0789241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A50725-AC7A-4FDB-887A-3DCB369C943D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D463EC3C-88F1-46D9-ADB6-6283DC23B0B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F8E361-E6D3-4666-B18D-928D550FD5D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6948CD9-8489-46BA-9159-24C842490702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35C43087-760E-482A-B34E-141A29AC57A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"669211F7-90EA-47AB-A787-34DD79DF8E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"025B16D8-1023-4D47-BADD-C1E838B47D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320E691F-D417-4D81-A223-C46FEFFD908A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3B06B40-327D-4EFA-AD19-DA1CA7D50B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB8BEC58-AB2A-4953-A2E8-338EB894A494\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABDE6C9A-4F24-42B4-8AA3-3EBC97190322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FB2813-BE9F-46A8-864B-435D883CA0FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9DF1336-F831-4507-B45E-574BDE8AA8BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33268B2F-3591-48D9-B123-92E3ABF157F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0830367A-9FB3-4291-88C0-38A471DFD22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E4EB1B-2E8B-4504-AB05-F4D4E6B038E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5815E25-5305-4A32-81B3-89DB1D5C1AC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD69C98-11AB-4BB5-A91A-F029BA0E1DB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98CF3A74-B9F8-4689-B81C-F579D827DA5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBD9C7D-CD0B-4B5B-BEC2-F67610DEDE2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"798F7A01-F006-4589-82F8-943F81015693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36940C55-BFD4-4C77-A26B-C0F273EAC2EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8135B1-FB22-4755-A5ED-CDB16E3E85A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B4685BF-394A-4426-980A-2B1D37737C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB8A074B-069A-4520-8E3C-AB614C31B68A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7069A49C-038C-4E7B-AF03-4D90D5734414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E895B9-5AF7-4A1F-B740-B3E13DE3254E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD29EFD-1ADB-4349-8E7D-EA6B34B0F6DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC720A50-9EF5-4B73-86D1-AE87D402611E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"464942E8-EDF3-4ECB-B907-FFCDBC9079C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1246C0E-DCAC-405E-ADCE-3D16D659C567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5703D8EC-259B-49C3-AADE-916227DEB96F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184B40E3-28FD-49A4-9560-5E26293D7D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCE8BBA-6721-4257-9F2E-23AEB104564E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"268661C2-7A45-4743-8A09-48B3EE21212E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.1.4\",\"matchCriteriaId\":\"D746FCB4-9ACA-425D-929F-F46EDDEC1B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28FB0CB-D636-4F85-B5F7-70EC30053925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC16D1C-065A-4D1A-BA6E-528A71DF65CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27319629-171F-42AA-A95F-2D71F78097D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297F9438-0F04-4128-94A8-A504B600929E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8618621-F871-4531-9F6C-7D60F2BF8B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824DED2D-FA1D-46FC-8252-6E25546DAE29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1641DDFA-3BF1-467F-8EC3-98114FF9F07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF40CDA4-4716-4815-9ED0-093FE266734C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D06D54D-97FD-49FD-B251-CC86FBA68CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A5D868-0016-44AB-80E6-E5DF91F15455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863383DA-0BC6-4A96-835A-A96128EC0202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D3BE2B-5A01-4AD4-A436-0056B50A535D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A20F171-79FE-43B9-8309-B18341639FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"126EF22D-29BC-4366-97BC-B261311E6251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A939B80-0AD0-48AF-81A7-370716F56639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28528CE-4943-4F82-80C0-A629DA3E6702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12E22AF0-2B66-425A-A1EE-4F0E3B0433E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB34ECBE-33E8-40E1-936B-7800D2525AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107C59BE-D8CF-4A17-8DFB-BED2AB12388D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36C86BB9-0328-4E34-BC2B-47B3471EC262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54A8681-2D8A-4B0B-A947-82F3CE1FB03C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0070D83-2E27-4DA8-8D10-A6A697216F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9ACA63-4528-4090-B1EA-1FE57A6B0555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7252935C-E421-4339-B61F-0299E28888DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DD342BF-096A-4082-B700-19629F2BDE87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93141AB6-26F2-4C6D-95B3-D383EABB4034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5C61FF-7CD3-410A-94F2-5DE701466B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A01C87-B02A-4239-8340-B396D0E6B21C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06980521-B0EA-434D-89AD-A951EAF1D23F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3AE6A93-3977-4B32-B2F6-55C94387DDE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78F1F2C-2BFF-4D55-A754-102D6C42081B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A4AF71-8E71-432A-B908-361DAF99F4B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE0068D-C699-4646-9658-610409925A79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C215DD-BC98-4283-BF13-69556EF7CB78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C3966E-C136-47A9-B5B4-70613756ED27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22AD2A1F-A637-47DE-A69F-DAE4ABDFA4BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6D398B8-821B-4DE9-ADF1-4983051F964C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CCE5F2-4D32-404B-BAAC-E64F11BD41FB\"}]}]}],\"references\":[{\"url\":\"http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1512.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0217.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/51448\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/54886\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/55568\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://support.apple.com/kb/HT5934\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://support.apple.com/kb/HT6001\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2580\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:056\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.securityfocus.com/bid/56684\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.securitytracker.com/id?1027815\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1656-1\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=880466\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=158249\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/80294\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1512.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0217.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/51448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/54886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/55568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5934\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT6001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2580\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/56684\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1027815\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1656-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=880466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=158249\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/80294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.