Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-508-1 | expat security update |
Debian DSA |
DSA-3597-1 | expat security update |
EUVD |
EUVD-2012-6544 | Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function. |
Ubuntu USN |
USN-3010-1 | Expat vulnerabilities |
Ubuntu USN |
USN-3013-1 | XML-RPC for C and C++ vulnerabilities |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: microfocus
Published:
Updated: 2024-08-06T21:36:02.049Z
Reserved: 2016-06-03T00:00:00.000Z
Link: CVE-2012-6702
No data.
Status : Modified
Published: 2016-06-16T18:59:00.327
Modified: 2026-05-06T22:30:45.220
Link: CVE-2012-6702
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN