Total
852 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-27017 | 2 Microsoft, Trendmicro | 2 Windows, Interscan Messaging Security Virtual Appliance | 2021-07-21 | 4.0 MEDIUM | 4.9 MEDIUM |
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an XML External Entity Processing (XXE) vulnerability which could allow an authenticated administrator to read arbitrary local files. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability. | |||||
CVE-2020-4481 | 1 Ibm | 1 Urbancode Deploy | 2021-07-21 | 6.4 MEDIUM | 8.2 HIGH |
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181848. | |||||
CVE-2019-17020 | 2 Canonical, Mozilla | 2 Ubuntu Linux, Firefox | 2021-07-21 | 4.3 MEDIUM | 6.5 MEDIUM |
If an XML file is served with a Content Security Policy and the XML file includes an XSL stylesheet, the Content Security Policy will not be applied to the contents of the XSL stylesheet. If the XSL sheet e.g. includes JavaScript, it would bypass any of the restrictions of the Content Security Policy applied to the XML document. This vulnerability affects Firefox < 72. | |||||
CVE-2020-24052 | 1 Moog | 4 Exvf5c-2, Exvf5c-2 Firmware, Exvp7c2-3 and 1 more | 2021-07-21 | 6.4 MEDIUM | 9.1 CRITICAL |
Several XML External Entity (XXE) vulnerabilities in the Moog EXO Series EXVF5C-2 and EXVP7C2-3 units allow remote unauthenticated users to read arbitrary files via a crafted Document Type Definition (DTD) in an XML request. | |||||
CVE-2020-8540 | 1 Zohocorp | 1 Manageengine Desktop Central | 2021-07-21 | 7.5 HIGH | 9.8 CRITICAL |
An XML external entity (XXE) vulnerability in Zoho ManageEngine Desktop Central before the 07-Mar-2020 update allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. | |||||
CVE-2019-19702 | 1 Modoboa | 1 Modoboa-dmarc | 2021-07-21 | 5.0 MEDIUM | 7.5 HIGH |
The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this to perform a denial of service against the DMARC reporting functionality, such as by referencing the /dev/random file within XML documents that are emailed to the address in the rua field of the DMARC records of a domain. | |||||
CVE-2020-28387 | 1 Siemens | 1 Solid Edge | 2021-07-15 | 4.3 MEDIUM | 5.5 MEDIUM |
A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). When opening a specially crafted SEECTCXML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11923) | |||||
CVE-2021-32754 | 1 Flowdroid Project | 1 Flowdroid | 2021-07-15 | 3.5 LOW | 5.3 MEDIUM |
FlowDroid is a data flow analysis tool. FlowDroid versions prior to 2.9.0 contained an XML external entity (XXE) vulnerability that allowed an attacker who had control over the source/sink definition file in XML format to read files from external locations. In order for this to occur, the XML-based format for sources and sinks had to be used and the attacker had to able control the source/sink definition file. The vulnerability was patched in version 2.9.0. As a workaround, do not allow untrusted entities to control the source/sink definition file. | |||||
CVE-2021-32972 | 1 Panasonic | 1 Fpwin Pro | 2021-07-13 | 4.3 MEDIUM | 5.5 MEDIUM |
Panasonic FPWIN Pro, all Versions 7.5.1.1 and prior, allows an attacker to craft a project file specifying a URI that causes the XML parser to access the URI and embed the contents, which may allow the attacker to disclose information that is accessible in the context of the user executing software. | |||||
CVE-2012-1102 | 1 Xml\ | 1 \ | 2021-07-13 | 5.0 MEDIUM | 7.5 HIGH |
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used. | |||||
CVE-2021-25951 | 1 Xml2dict Project | 1 Xml2dict | 2021-07-06 | 5.0 MEDIUM | 7.5 HIGH |
XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service. | |||||
CVE-2021-22338 | 1 Huawei | 2 Ecns280, Ecns280 Firmware | 2021-07-02 | 5.0 MEDIUM | 5.3 MEDIUM |
There is an XXE injection vulnerability in eCNS280 V100R005C00 and V100R005C10. A module does not perform the strict operation to the input XML message. Attacker can send specific message to exploit this vulnerability, leading to the module denial of service. | |||||
CVE-2019-9843 | 1 Diffplug | 2 Gradle, Maven | 2021-07-01 | 5.1 MEDIUM | 7.5 HIGH |
In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file. | |||||
CVE-2021-29620 | 1 Reportportal | 1 Service-api | 2021-06-29 | 5.0 MEDIUM | 7.5 HIGH |
Report portal is an open source reporting and analysis framework. Starting from version 3.1.0 of the service-api XML parsing was introduced. Unfortunately the XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. This will be resolved in the 5.4.0 release. | |||||
CVE-2021-35066 | 1 Connectwise | 1 Automate | 2021-06-28 | 7.5 HIGH | 9.8 CRITICAL |
An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132. | |||||
CVE-2019-9670 | 1 Synacor | 1 Zimbra Collaboration Suite | 2021-06-26 | 7.5 HIGH | 9.8 CRITICAL |
mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml. | |||||
CVE-2021-28684 | 1 Powerarchiver | 1 Powerarchiver | 2021-06-23 | 4.3 MEDIUM | 4.3 MEDIUM |
The XML parser used in ConeXware PowerArchiver before 20.10.02 allows processing of external entities, which might lead to exfiltration of local files over the network (via an XXE attack). | |||||
CVE-2021-21669 | 1 Jenkins | 1 Generic Webhook Trigger | 2021-06-22 | 7.5 HIGH | 9.8 CRITICAL |
Jenkins Generic Webhook Trigger Plugin 1.72 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2020-5003 | 1 Ibm | 1 Financial Transaction Manager | 2021-06-21 | 6.4 MEDIUM | 9.1 CRITICAL |
IBM Financial Transaction Manager 3.2.4 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 192956. | |||||
CVE-2020-25817 | 1 Silverstripe | 1 Silverstripe | 2021-06-17 | 3.5 LOW | 4.8 MEDIUM |
SilverStripe through 4.6.0-rc1 has an XXE Vulnerability in CSSContentParser. A developer utility meant for parsing HTML within unit tests can be vulnerable to XML External Entity (XXE) attacks. When this developer utility is misused for purposes involving external or user submitted data in custom project code, it can lead to vulnerabilities such as XSS on HTML output rendered through this custom code. This is now mitigated by disabling external entities during parsing. (The correct CVE ID year is 2020 [CVE-2020-25817, not CVE-2021-25817]). |