Total
998 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-1693 | 1 Redhat | 1 Spacewalk | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
A flaw was found in Spacewalk up to version 2.9 where it was vulnerable to XML internal entity attacks via the /rpc/api endpoint. An unauthenticated remote attacker could use this flaw to retrieve the content of certain files and trigger a denial of service, or in certain circumstances, execute arbitrary code on the Spacewalk server. | |||||
CVE-2020-13692 | 5 Debian, Fedoraproject, Netapp and 2 more | 5 Debian Linux, Fedora, Steelstore Cloud Integrated Storage and 2 more | 2023-11-07 | 6.8 MEDIUM | 7.7 HIGH |
PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE. | |||||
CVE-2020-10683 | 5 Canonical, Dom4j Project, Netapp and 2 more | 38 Ubuntu Linux, Dom4j, Oncommand Api Services and 35 more | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. | |||||
CVE-2019-9843 | 1 Diffplug | 2 Gradle, Maven | 2023-11-07 | 5.1 MEDIUM | 7.5 HIGH |
In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file. | |||||
CVE-2019-9658 | 3 Checkstyle, Debian, Fedoraproject | 3 Checkstyle, Debian Linux, Fedora | 2023-11-07 | 5.0 MEDIUM | 5.3 MEDIUM |
Checkstyle before 8.18 loads external DTDs by default. | |||||
CVE-2019-3774 | 1 Pivotal Software | 1 Spring Batch | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | |||||
CVE-2019-3768 | 1 Emc | 1 Rsa Authentication Manager | 2023-11-07 | 4.0 MEDIUM | 6.5 MEDIUM |
RSA Authentication Manager versions prior to 8.4 P7 contain an XML Entity Injection Vulnerability. A remote authenticated malicious user could potentially exploit this vulnerability to cause information disclosure of local system files by supplying specially crafted XML message. | |||||
CVE-2019-3481 | 1 Hp | 1 Arcsight Logger | 2023-11-07 | 7.5 HIGH | 7.1 HIGH |
Mitigates a XML External Entity Parsing issue in ArcSight Logger versions prior to 6.7. | |||||
CVE-2019-20191 | 1 Sync | 3 Oxygen Xml Author, Oxygen Xml Developer, Oxygen Xml Editor | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Oxygen XML Editor 21.1.1 allows XXE to read any file. | |||||
CVE-2019-18943 | 1 Microfocus | 1 Solutions Business Manager | 2023-11-07 | 5.2 MEDIUM | 8.0 HIGH |
Micro Focus Solutions Business Manager versions prior to 11.7.1 are vulnerable to XML External Entity Processing (XXE) on certain operations. | |||||
CVE-2019-17554 | 1 Apache | 1 Olingo | 2023-11-07 | 4.3 MEDIUM | 5.5 MEDIUM |
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks. | |||||
CVE-2019-17085 | 1 Microfocus | 1 Operations Agent | 2023-11-07 | 4.0 MEDIUM | 6.5 MEDIUM |
XXE attack vulnerability on Micro Focus Operations Agent, affected version 12.0, 12.01, 12.02, 12.03, 12.04, 12.05, 12.06, 12.10, 12.11. The vulnerability could be exploited to do an XXE attack on Operations Agent. | |||||
CVE-2019-12415 | 2 Apache, Oracle | 27 Poi, Application Testing Suite, Banking Enterprise Originations and 24 more | 2023-11-07 | 2.1 LOW | 5.5 MEDIUM |
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing. | |||||
CVE-2019-10782 | 1 Checkstyle | 1 Checkstyle | 2023-11-07 | 5.0 MEDIUM | 5.3 MEDIUM |
All versions of com.puppycrawl.tools:checkstyle before 8.29 are vulnerable to XML External Entity (XXE) Injection due to an incomplete fix for CVE-2019-9658. | |||||
CVE-2019-10080 | 1 Apache | 1 Nifi | 2023-11-07 | 4.0 MEDIUM | 6.5 MEDIUM |
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses. | |||||
CVE-2019-0228 | 3 Apache, Fedoraproject, Oracle | 14 James, Pdfbox, Fedora and 11 more | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XFDF. | |||||
CVE-2019-0188 | 2 Apache, Oracle | 5 Camel, Enterprise Data Quality, Enterprise Manager Base Platform and 2 more | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed. | |||||
CVE-2018-9116 | 1 Wiremock | 1 Wiremock | 2023-11-07 | 6.4 MEDIUM | 9.1 CRITICAL |
An XXE vulnerability within WireMock before 2.16.0 allows a remote unauthenticated attacker to access local files and internal resources and potentially cause a Denial of Service. | |||||
CVE-2018-8027 | 1 Apache | 1 Camel | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Apache Camel 2.20.0 to 2.20.3 and 2.21.0 Core is vulnerable to XXE in XSD validation processor. | |||||
CVE-2018-8010 | 1 Apache | 1 Solr | 2023-11-07 | 2.1 LOW | 5.5 MEDIUM |
This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. Users are advised to upgrade to either Solr 6.6.4 or Solr 7.3.1 releases both of which address the vulnerability. Once upgrade is complete, no other steps are required. Those releases only allow external entities and Xincludes that refer to local files / zookeeper resources below the Solr instance directory (using Solr's ResourceLoader); usage of absolute URLs is denied. Keep in mind, that external entities and XInclude are explicitly supported to better structure config files in large installations. Before Solr 6 this was no problem, as config files were not accessible through the APIs. |