Filtered by vendor Restlet
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-14868 | 1 Restlet | 1 Restlet | 2017-12-15 | 5.0 MEDIUM | 7.5 HIGH |
Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension. | |||||
CVE-2017-14949 | 1 Restlet | 1 Restlet | 2017-12-15 | 5.0 MEDIUM | 7.5 HIGH |
Restlet Framework before 2.3.12 allows remote attackers to access arbitrary files via a crafted REST API HTTP request that conducts an XXE attack, because only general external entities (not parameter external entities) are properly considered. This is related to XmlRepresentation, DOMRepresentation, SaxRepresentation, and JacksonRepresentation. | |||||
CVE-2014-1868 | 1 Restlet | 1 Restlet Framework | 2017-08-28 | 5.0 MEDIUM | N/A |
Restlet Framework 2.1.x before 2.1.7 and 2.x.x before 2.2 RC1, when using XMLRepresentation or XML serializers, allows attackers to cause a denial of service via an XML Entity Expansion (XEE) attack. | |||||
CVE-2013-4221 | 1 Restlet | 1 Restlet | 2016-12-07 | 7.5 HIGH | N/A |
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML. | |||||
CVE-2013-4271 | 1 Restlet | 1 Restlet | 2016-12-06 | 7.5 HIGH | N/A |
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221. |