Show filters
127 Total Results
Displaying 11-20 of 127
Sort by:
Attacker Value
Unknown
CVE-2020-4949
Disclosure Date: January 25, 2021 (last updated February 22, 2025)
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 192025.
0
Attacker Value
Unknown
CVE-2020-27858
Disclosure Date: January 20, 2021 (last updated February 22, 2025)
This vulnerability allows remote attackers to disclose sensitive information on affected installations of CA Arcserve D2D 16.5. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getNews method. Due to the improper restriction of XML External Entity (XXE) references, a specially-crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-11103.
0
Attacker Value
Unknown
CVE-2021-22498
Disclosure Date: January 19, 2021 (last updated February 22, 2025)
XML External Entity Injection vulnerability in Micro Focus Application Lifecycle Management (Previously known as Quality Center) product. The vulnerability affects versions 12.x, 12.60 Patch 5 and earlier, 15.0.1 Patch 2 and earlier and 15.5. The vulnerability could be exploited to allow an XML External Entity Injection.
0
Attacker Value
Unknown
CVE-2021-23899
Disclosure Date: January 13, 2021 (last updated February 22, 2025)
OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents.
0
Attacker Value
Unknown
CVE-2020-26981
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11890)
0
Attacker Value
Unknown
CVE-2020-27148
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
The TIBCO EBX Add-on for Oracle Hyperion EPM, TIBCO EBX Data Exchange Add-on, and TIBCO EBX Insight Add-on components of TIBCO Software Inc.'s TIBCO EBX Add-ons contain a vulnerability that theoretically allows a low privileged attacker with network access to execute an XML External Entity (XXE) attack. Affected releases are TIBCO Software Inc.'s TIBCO EBX Add-ons: versions 4.4.2 and below.
0
Attacker Value
Unknown
CVE-2021-21470
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
SAP EPM Add-in for Microsoft Office, version - 1010 and SAP EPM Add-in for SAP Analysis Office, version - 2.8, allows an authenticated attacker with user privileges to parse malicious XML files which could result in XXE-based attacks in applications that accept attacker-controlled XML configuration files. This occurs as logging service does not disable XML external entities when parsing configuration files and a successful exploit would result in limited impact on integrity and availability of the application.
0
Attacker Value
Unknown
CVE-2020-4606
Disclosure Date: January 07, 2021 (last updated February 22, 2025)
IBM Security Verify Privilege Manager 10.8 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A local attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 184883.
0
Attacker Value
Unknown
CVE-2020-28734
Disclosure Date: December 30, 2020 (last updated February 22, 2025)
Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role.
0
Attacker Value
Unknown
CVE-2020-26247
Disclosure Date: December 30, 2020 (last updated February 22, 2025)
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.
0