Known vulnerabilities in Alpine Linux Development Team libxslt (Alpine package)

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › Alpine Linux Development Team › libxslt (Alpine package)

Known vulnerabilities in Alpine Linux Development Team libxslt (Alpine package)

Vendor: Alpine Linux Development Team
Website: https://alpinelinux.org/
Total Security Bulletins: 11

Security bulletins (11)

Secuity bulletin Severity Status Published
SB2019111702: Information disclosure in libxslt (Alpine package) Low
Patched
17.11.2019
SB2019111703: Information disclosure in libxslt (Alpine package) Low
Patched
17.11.2019
SB2019102334: Buffer overflow in libxslt (Alpine package) High
Patched
23.10.2019
SB2019041741: Permissions, Privileges, and Access Controls in libxslt (Alpine package) Medium
Patched
17.04.2019
SB2017032716: Memory corruption in libxslt (Alpine package) High
Patched
27.03.2017
SB2016062307: Buffer overflow in libxslt (Alpine package) Medium
Patched
23.06.2016
SB2016062308: Input validation error in libxslt (Alpine package) Medium
Patched
23.06.2016
SB2015121003: Input validation error in libxslt (Alpine package) Medium
Patched
10.12.2015
SB2013041003: Input validation error in libxslt (Alpine package) Medium
Patched
10.04.2013
SB2012111404: Resource management error in libxslt (Alpine package) Medium
Patched
14.11.2012
SB2012111405: Permissions, Privileges, and Access Controls in bacula (Alpine package) Low
Patched
14.11.2012


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or