Total
1111 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-32138 | 2025-04-07 | N/A | 6.6 MEDIUM | ||
Improper Restriction of XML External Entity Reference vulnerability in supsystic Easy Google Maps allows XML Injection. This issue affects Easy Google Maps: from n/a through 1.11.17. | |||||
CVE-2018-0878 | 1 Microsoft | 7 Windows 10, Windows 7, Windows 8.1 and 4 more | 2025-04-04 | 2.6 LOW | 3.1 LOW |
Windows Remote Assistance in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how XML External Entities (XXE) are processed, aka "Windows Remote Assistance Information Disclosure Vulnerability". | |||||
CVE-2023-22624 | 1 Zohocorp | 1 Manageengine Exchange Reporter Plus | 2025-04-04 | N/A | 7.5 HIGH |
Zoho ManageEngine Exchange Reporter Plus before 5708 allows attackers to conduct XXE attacks. | |||||
CVE-2019-9670 | 1 Synacor | 1 Zimbra Collaboration Suite | 2025-04-03 | 7.5 HIGH | 9.8 CRITICAL |
mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml. | |||||
CVE-2005-1306 | 1 Adobe | 2 Acrobat, Acrobat Reader | 2025-04-03 | 5.0 MEDIUM | 7.5 HIGH |
The Adobe Reader control in Adobe Reader and Acrobat 7.0 and 7.0.1 allows remote attackers to determine the existence of files via Javascript containing XML script, aka the "XML External Entity vulnerability." | |||||
CVE-2023-24430 | 1 Jenkins | 1 Semantic Versioning | 2025-04-02 | N/A | 9.8 CRITICAL |
Jenkins Semantic Versioning Plugin 1.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-24429 | 1 Jenkins | 1 Semantic Versioning | 2025-04-02 | N/A | 9.8 CRITICAL |
Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. | |||||
CVE-2023-24443 | 1 Jenkins | 1 Testcomplete Support | 2025-04-02 | N/A | 9.8 CRITICAL |
Jenkins TestComplete support Plugin 2.8.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-24441 | 1 Jenkins | 1 Mstest | 2025-04-02 | N/A | 9.8 CRITICAL |
Jenkins MSTest Plugin 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2014-2052 | 1 Owncloud | 2 Owncloud, Owncloud Server | 2025-03-31 | 7.5 HIGH | 9.8 CRITICAL |
Zend Framework, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. | |||||
CVE-2024-36827 | 1 Dnkorpushov | 1 Ebookmeta | 2025-03-28 | N/A | 7.5 HIGH |
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of ebookmeta before v1.2.8 allows attackers to access sensitive information or cause a Denial of Service (DoS) via crafted XML input. | |||||
CVE-2025-1781 | 2025-03-28 | N/A | N/A | ||
There is a XXE in W3CSS Validator versions before cssval-20250226 that allows an attacker to use specially-crafted XML objects to coerce server-side request forgery (SSRF). This could be exploited to read arbitrary local files if an attacker has access to exception messages. | |||||
CVE-2023-22322 | 1 Omron | 1 Cx-motion Pro | 2025-03-27 | N/A | 5.5 MEDIUM |
Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion Pro 1.4.6.013 and earlier. If a user opens a specially crafted project file created by an attacker, sensitive information in the file system where CX-Motion Pro is installed may be disclosed. | |||||
CVE-2023-50380 | 1 Apache | 1 Ambari | 2025-03-27 | N/A | 6.5 MEDIUM |
XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue. More Details: Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation. This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges. | |||||
CVE-2023-49234 | 2025-03-27 | N/A | 6.3 MEDIUM | ||
An XML external entity (XXE) vulnerability was found in Stilog Visual Planning 8. It allows an authenticated attacker to access local server files and exfiltrate data to an external server. | |||||
CVE-2025-29932 | 2025-03-27 | N/A | 4.1 MEDIUM | ||
In JetBrains GoLand before 2025.1 an XXE during debugging was possible | |||||
CVE-2022-47873 | 1 Netcad | 1 Keos | 2025-03-27 | N/A | 9.8 CRITICAL |
Netcad KEOS 1.0 is vulnerable to XML External Entity (XXE) resulting in SSRF with XXE (remote). | |||||
CVE-2024-21082 | 1 Oracle | 1 Bi Publisher | 2025-03-26 | N/A | 9.8 CRITICAL |
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: XML Services). Supported versions that are affected are 7.0.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | |||||
CVE-2022-45588 | 1 Talend | 1 Remote Engine Gen 2 | 2025-03-26 | N/A | 7.8 HIGH |
All versions before R2022-09 of Talend's Remote Engine Gen 2 are potentially vulnerable to XML External Entity (XXE) type of attacks. Users should download the R2022-09 release or later and use it in place of the previous version. Talend Remote Engine Gen 1 and Talend Cloud Engine for Design are not impacted. This XXE vulnerability could only be exploited by someone with the appropriate rights to edit pipelines on the Talend platform. It could not be triggered remotely or by other user input. | |||||
CVE-2023-24323 | 1 Mojoportal | 1 Mojoportal | 2025-03-24 | N/A | 8.8 HIGH |
Mojoportal v2.7 was discovered to contain an authenticated XML external entity (XXE) injection vulnerability. |