CWE:
 

Topic
Date
Author
Med.
Revive Adserver 3.0.5 Cross Site Scripting / Denial Of Service
18.12.2014
Matteo Beccati
Med.
Ruby Entity expansion DoS vulnerability in REXML (XML bomb)
07.03.2013
Kurt Seifried


CVEMAP Search Results

CVE
Details
Description
2023-08-08
Waiting for details
CVE-2023-3569

Updating...
 

 
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.

 
2023-03-20
Waiting for details
CVE-2023-28118

Updating...
 

 
kaml provides YAML support for kotlinx.serialization. Prior to version 0.53.0, applications that use kaml to parse untrusted input containing anchors and aliases may consume excessive memory and crash. Version 0.53.0 and later default to refusing to parse YAML documents containing anchors and aliases. There are no known workarounds.

 
2022-07-12
Low
CVE-2022-34467

Vendor: Mendix
Software: Excel importer
 

 
A vulnerability has been identified in Mendix Excel Importer Module (Mendix 8 compatible) (All versions < V9.2.2), Mendix Excel Importer Module (Mendix 9 compatible) (All versions < V10.1.2). The affected component is vulnerable to XML Entity Expansion Injection. An attacker may use this to compromise the availability of the affected component.

 
2022-06-21
Medium
CVE-2021-40511

Vendor: Obdasystems
Software: Mastro
 

 
OBDA systems�?? Mastro 1.0 is vulnerable to XML Entity Expansion (aka �??billion laughs�?�) attack allowing denial of service.

 
2022-04-22
Low
CVE-2021-20464

Vendor: IBM
Software: Cognos analytics
 

 
IBM Cognos Analytics PowerPlay (IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7) could be vulnerable to an XML Bomb attack by a malicious authenticated user. IBM X-Force ID: 196813.

 
2022-03-10
Medium
CVE-2022-26662

Vendor: Tryton
Software: Proteus
 

 
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

 
2021-08-10
Medium
CVE-2021-38490

Vendor: Altova
Software: Mobiletogeth...
 

 
Altova MobileTogether Server before 7.3 SP1 allows XML exponential entity expansion, a different vulnerability than CVE-2021-37425.

 
2021-07-09
Low
CVE-2021-3541

Vendor: Xmlsoft
Software: Libxml2
 

 
A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.

 
2021-06-28
Low
CVE-2020-15303

Vendor: Infoblox
Software: NIOS
 

 
Infoblox NIOS before 8.5.2 allows entity expansion during an XML upload operation, a related issue to CVE-2003-1564.

 
2021-06-16
Low
CVE-2021-32623

Vendor: Apereo
Software: Opencast
 

 
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue.

 

 


Copyright 2023, cxsecurity.com

 

Back to Top