CWE:
 

Tytuł
Data
Autor
Med.
Revive Adserver 3.0.5 Cross Site Scripting / Denial Of Service
18.12.2014
Matteo Beccati
Med.
Ruby Entity expansion DoS vulnerability in REXML (XML bomb)
07.03.2013
Kurt Seifried


Common Weakness Enumeration (CWE)

CVE
Szczegóły
Opis
2024-03-26
Waiting for details
CVE-2024-1455

Updating...
 

 
The XMLOutputParser in LangChain uses the etree module from the XML parser in the standard python library which has some XML vulnerabilities; see: https://docs.python.org/3/library/xml.html This primarily affects users that combine an LLM (or agent) with the `XMLOutputParser` and expose the component via an endpoint on a web-service. This would allow a malicious party to attempt to manipulate the LLM to produce a malicious payload for the parser that would compromise the availability of the service. A successful attack is predicated on: 1. Usage of XMLOutputParser 2. Passing of malicious input into the XMLOutputParser either directly or by trying to manipulate an LLM to do so on the users behalf 3. Exposing the component via a web-service

 
2023-12-07
Waiting for details
CVE-2023-49967

Updating...
 

 
Typecho v1.2.1 was discovered to be vulnerable to an XML Quadratic Blowup attack via the component /index.php/action/xmlrpc.

 
2023-08-08
Waiting for details
CVE-2023-3569

Updating...
 

 
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.

 
2023-03-20
Waiting for details
CVE-2023-28118

Updating...
 

 
kaml provides YAML support for kotlinx.serialization. Prior to version 0.53.0, applications that use kaml to parse untrusted input containing anchors and aliases may consume excessive memory and crash. Version 0.53.0 and later default to refusing to parse YAML documents containing anchors and aliases. There are no known workarounds.

 
2022-07-12
Low
CVE-2022-34467

Vendor: Mendix
Software: Excel importer
 

 
A vulnerability has been identified in Mendix Excel Importer Module (Mendix 8 compatible) (All versions < V9.2.2), Mendix Excel Importer Module (Mendix 9 compatible) (All versions < V10.1.2). The affected component is vulnerable to XML Entity Expansion Injection. An attacker may use this to compromise the availability of the affected component.

 
2022-06-21
Medium
CVE-2021-40511

Vendor: Obdasystems
Software: Mastro
 

 
OBDA systems�?? Mastro 1.0 is vulnerable to XML Entity Expansion (aka �??billion laughs�?�) attack allowing denial of service.

 
2022-04-22
Low
CVE-2021-20464

Vendor: IBM
Software: Cognos analytics
 

 
IBM Cognos Analytics PowerPlay (IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7) could be vulnerable to an XML Bomb attack by a malicious authenticated user. IBM X-Force ID: 196813.

 
2022-03-10
Medium
CVE-2022-26662

Vendor: Tryton
Software: Proteus
 

 
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

 
2021-08-10
Medium
CVE-2021-38490

Vendor: Altova
Software: Mobiletogeth...
 

 
Altova MobileTogether Server before 7.3 SP1 allows XML exponential entity expansion, a different vulnerability than CVE-2021-37425.

 
2021-07-09
Low
CVE-2021-3541

Vendor: Xmlsoft
Software: Libxml2
 

 
A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.

 

 


Copyright 2024, cxsecurity.com

 

Back to Top