Total
1036 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-27527 | 1 Touki-kyoutaku-online | 1 Shinseiyo Sogo Soft | 2024-11-21 | N/A | 7.5 HIGH |
Shinseiyo Sogo Soft (7.9A) and earlier improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the PC may be accessed by an attacker. | |||||
CVE-2023-27480 | 1 Xwiki | 1 Xwiki | 2024-11-21 | N/A | 7.7 HIGH |
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit rights on a document can trigger an XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. Users unable to upgrade may apply the patch `e3527b98fd` manually. | |||||
CVE-2023-27476 | 1 Osgeo | 1 Owslib | 2024-11-21 | N/A | 8.2 HIGH |
OWSLib is a Python package for client programming with Open Geospatial Consortium (OGC) web service interface standards, and their related content models. OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. This issue has been addressed in version 0.28.1. All users are advised to upgrade. The only known workaround is to patch the library manually. See `GHSA-8h9c-r582-mggc` for details. | |||||
CVE-2023-26999 | 1 Netscout | 1 Ngeniusone | 2024-11-21 | N/A | 9.8 CRITICAL |
An issue found in NetScout nGeniusOne v.6.3.4 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted file. | |||||
CVE-2023-26461 | 1 Sap | 1 Netweaver Enterprise Portal | 2024-11-21 | N/A | 6.8 MEDIUM |
SAP NetWeaver allows (SAP Enterprise Portal) - version 7.50, allows an authenticated attacker with sufficient privileges to access the XML parser which can submit a crafted XML file which when parsed will enable them to access but not modify sensitive files and data. It allows the attacker to view sensitive data which is owned by certain privileges. | |||||
CVE-2023-26267 | 1 Php-saml-sp Project | 1 Php-saml-sp | 2024-11-21 | N/A | 6.5 MEDIUM |
php-saml-sp before 1.1.1 and 2.x before 2.1.1 allows reading arbitrary files as the webserver user because resolving XML external entities was silently enabled via \LIBXML_DTDLOAD | \LIBXML_DTDATTR. | |||||
CVE-2023-26264 | 1 Talend | 1 Data Catalog | 2024-11-21 | N/A | 5.5 MEDIUM |
All versions of Talend Data Catalog before 8.0-20220907 are potentially vulnerable to XML External Entity (XXE) attacks in the license parsing code. | |||||
CVE-2023-26263 | 1 Talend | 1 Data Catalog | 2024-11-21 | N/A | 5.5 MEDIUM |
All versions of Talend Data Catalog before 8.0-20230110 are potentially vulnerable to XML External Entity (XXE) attacks in the /MIMBWebServices/license endpoint of the remote harvesting server. | |||||
CVE-2023-26058 | 1 Nokia | 1 Netact | 2024-11-21 | N/A | 6.5 MEDIUM |
An XXE issue was discovered in Nokia NetAct before 22 FP2211 via an XML document to a Performance Manager page. Input validation and a proper XML parser configuration are missing. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user. | |||||
CVE-2023-26057 | 1 Nokia | 1 Netact | 2024-11-21 | N/A | 6.5 MEDIUM |
An XXE issue was discovered in Nokia NetAct before 22 FP2211 via an XML document to the Configuration Dashboard page. Input validation and a proper XML parser configuration are missing. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user. | |||||
CVE-2023-26043 | 1 Geosolutionsgroup | 1 Geonode | 2024-11-21 | N/A | 6.5 MEDIUM |
GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. GeoNode is vulnerable to an XML External Entity (XXE) injection in the style upload functionality of GeoServer leading to Arbitrary File Read. This issue has been patched in version 4.0.3. | |||||
CVE-2023-25955 | 1 Mlit | 1 National Land Numerical Information Data Conversion Tool | 2024-11-21 | N/A | 5.5 MEDIUM |
National land numerical information data conversion tool all versions improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the PC may be accessed by an attacker. | |||||
CVE-2023-25926 | 2024-11-21 | N/A | 5.5 MEDIUM | ||
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 247599. | |||||
CVE-2023-24620 | 1 Esotericsoftware | 1 Yamlbeans | 2024-11-21 | N/A | 5.5 MEDIUM |
An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception. | |||||
CVE-2023-24470 | 1 Microfocus | 1 Arcsight Logger | 2024-11-21 | N/A | 9.1 CRITICAL |
Potential XML External Entity Injection in ArcSight Logger versions prior to 7.3.0. | |||||
CVE-2023-24443 | 1 Jenkins | 1 Testcomplete Support | 2024-11-21 | N/A | 9.8 CRITICAL |
Jenkins TestComplete support Plugin 2.8.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-24441 | 1 Jenkins | 1 Mstest | 2024-11-21 | N/A | 9.8 CRITICAL |
Jenkins MSTest Plugin 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-24430 | 1 Jenkins | 1 Semantic Versioning | 2024-11-21 | N/A | 9.8 CRITICAL |
Jenkins Semantic Versioning Plugin 1.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-24429 | 1 Jenkins | 1 Semantic Versioning | 2024-11-21 | N/A | 9.8 CRITICAL |
Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. | |||||
CVE-2023-24323 | 1 Mojoportal | 1 Mojoportal | 2024-11-21 | N/A | 8.8 HIGH |
Mojoportal v2.7 was discovered to contain an authenticated XML external entity (XXE) injection vulnerability. |