### [CVE-2018-14404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xfabiof/aws_inspector_parser - https://github.com/ARPSyndicate/cvemon - https://github.com/DanielEbert/winafl - https://github.com/KorayAgaya/TrivyWeb - https://github.com/Mohzeela/external-secret - https://github.com/Team-BT5/WinAFL-RDP - https://github.com/bacon-tomato-spaghetti/WinAFL-RDP - https://github.com/chaojianhu/winafl-intelpt - https://github.com/googleprojectzero/winafl - https://github.com/hardik05/winafl-powermopt - https://github.com/lacework/up-and-running-packer - https://github.com/laws-africa/slaw - https://github.com/pranav0408/WinAFL - https://github.com/s0i37/winafl_inmemory - https://github.com/scottford-lw/up-and-running-packer - https://github.com/siddharthraopotukuchi/trivy - https://github.com/simiyo/trivy - https://github.com/ssumachai/CS182-Project - https://github.com/t31m0/Vulnerability-Scanner-for-Containers - https://github.com/umahari/security - https://github.com/yrime/WinAflCustomMutate