Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "apple:icloud",
"extracted_events": [
{
"fixed": "5.2.1"
}
]
},
{
"cpes": [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "apple:iphone_os",
"extracted_events": [
{
"last_affected": "9.3.2"
}
]
},
{
"cpes": [
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "apple:itunes",
"extracted_events": [
{
"last_affected": "12.4.1"
}
]
},
{
"cpes": [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "apple:mac_os_x",
"extracted_events": [
{
"fixed": "10.11.6"
}
]
},
{
"cpes": [
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
],
"vendor_product": "apple:tvos",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.2.1"
}
]
},
{
"cpes": [
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "apple:watchos",
"extracted_events": [
{
"last_affected": "2.2.1"
}
]
},
{
"cpes": [
"cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "hp:icewall_federation_agent",
"extracted_events": [
{
"last_affected": "3.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "mcafee:web_gateway",
"extracted_events": [
{
"last_affected": "7.5.2.10"
},
{
"introduced": "7.6.0.0"
},
{
"last_affected": "7.6.2.3"
}
]
},
{
"cpes": [
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "oracle:linux",
"extracted_events": [
{
"last_affected": "6"
},
{
"last_affected": "7-0"
}
]
},
{
"cpes": [
"cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "oracle:vm_server",
"extracted_events": [
{
"last_affected": "3.3"
},
{
"last_affected": "3.4"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_desktop",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_server_aus",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
},
{
"last_affected": "7.3"
},
{
"last_affected": "7.4"
},
{
"last_affected": "7.6"
},
{
"last_affected": "7.7"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_server_eus",
"extracted_events": [
{
"last_affected": "7.2"
},
{
"last_affected": "7.3"
},
{
"last_affected": "7.4"
},
{
"last_affected": "7.5"
},
{
"last_affected": "7.6"
},
{
"last_affected": "7.7"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux_server_tus",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
},
{
"last_affected": "7.3"
},
{
"last_affected": "7.6"
},
{
"last_affected": "7.7"
}
]
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "redhat:enterprise_linux_workstation",
"extracted_events": [
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
}
]
},
{
"cpes": [
"cpe:2.3:o:slackware:slackware_linux:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:14.1:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "slackware:slackware_linux",
"extracted_events": [
{
"last_affected": "14.0"
},
{
"last_affected": "14.1"
}
]
},
{
"cpes": [
"cpe:2.3:a:tenable:log_correlation_engine:4.8.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "tenable:log_correlation_engine",
"extracted_events": [
{
"last_affected": "4.8.0"
}
]
}
]
}