Loading
Generated remediation guidance and an executive summary. No account required.
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
Cite this page
CVE-2012-6702. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2012-6702
Use CWE-310, Libexpat Project vendor hub and Libexpat product page to widen CVE-2012-6702 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-45492, CVE-2024-45491 and CVE-2025-59375 for nearby disclosures in the same product family.