Total
1074 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-38342 | 1 Safe | 1 Fme Server | 2024-08-03 | 8.5 High |
Safe Software FME Server v2021.2.5, v2022.0.0.2 and below was discovered to contain a XML External Entity (XXE) vulnerability which allows authenticated attackers to perform data exfiltration or Server-Side Request Forgery (SSRF) attacks. | ||||
CVE-2022-37911 | 1 Arubanetworks | 2 Arubaos, Sd-wan | 2024-08-03 | 3.8 Low |
Due to improper restrictions on XML entities multiple vulnerabilities exist in the command line interface of ArubaOS. A successful exploit could allow an authenticated attacker to retrieve files from the local system or cause the application to consume system resources, resulting in a denial of service condition. | ||||
CVE-2022-37189 | 1 Ddmal | 1 Mei2volpiano | 2024-08-03 | 7.5 High |
DDMAL MEI2Volpiano 0.8.2 is vulnerable to XML External Entity (XXE), leading to a Denial of Service. This occurs due to the usage of the unsafe 'xml.etree' library to parse untrusted XML input. | ||||
CVE-2022-36969 | 1 Aveva | 1 Aveva Edge | 2024-08-03 | 7.1 High |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the LoadImportedLibraries method. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. Was ZDI-CAN-17394. | ||||
CVE-2022-35741 | 1 Apache | 1 Cloudstack | 2024-08-03 | 9.8 Critical |
Apache CloudStack version 4.5.0 and later has a SAML 2.0 authentication Service Provider plugin which is found to be vulnerable to XML external entity (XXE) injection. This plugin is not enabled by default and the attacker would require that this plugin be enabled to exploit the vulnerability. When the SAML 2.0 plugin is enabled in affected versions of Apache CloudStack could potentially allow the exploitation of XXE vulnerabilities. The SAML 2.0 messages constructed during the authentication flow in Apache CloudStack are XML-based and the XML data is parsed by various standard libraries that are now understood to be vulnerable to XXE injection attacks such as arbitrary file reading, possible denial of service, server-side request forgery (SSRF) on the CloudStack management server. | ||||
CVE-2022-35168 | 1 Sap | 1 Business One | 2024-08-03 | 7.5 High |
Due to improper input sanitization of XML input in SAP Business One - version 10.0, an attacker can perform a denial-of-service attack rendering the system temporarily inoperative. | ||||
CVE-2022-34793 | 1 Jenkins | 1 Recipe | 2024-08-03 | 8.8 High |
Jenkins Recipe Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2022-34716 | 2 Microsoft, Redhat | 9 .net, .net Core, Powershell and 6 more | 2024-08-03 | 5.9 Medium |
.NET Spoofing Vulnerability | ||||
CVE-2022-34001 | 1 Unit4 | 1 Enterprise Resource Planning | 2024-08-03 | 6.5 Medium |
Unit4 ERP through 7.9 allows XXE via ExecuteServerProcessAsynchronously. | ||||
CVE-2022-32285 | 1 Mendix | 1 Saml | 2024-08-03 | 7.5 High |
A vulnerability has been identified in Mendix SAML Module (Mendix 7 compatible) (All versions < V1.16.6), Mendix SAML Module (Mendix 8 compatible) (All versions < V2.2.2), Mendix SAML Module (Mendix 9 compatible) (All versions < V3.2.3). The affected module is vulnerable to XML External Entity (XXE) attacks due to insufficient input sanitation. This may allow an attacker to disclose confidential data under certain circumstances. | ||||
CVE-2022-31678 | 1 Vmware | 2 Cloud Foundation, Nsx Data Center | 2024-08-03 | 9.1 Critical |
VMware Cloud Foundation (NSX-V) contains an XML External Entity (XXE) vulnerability. On VCF 3.x instances with NSX-V deployed, this may allow a user to exploit this issue leading to a denial-of-service condition or unintended information disclosure. | ||||
CVE-2022-31471 | 1 Untangle Project | 1 Untangle | 2024-08-03 | 7.5 High |
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files. | ||||
CVE-2022-31447 | 1 Magicpin | 1 Magicpin | 2024-08-03 | 7.5 High |
An XML external entity (XXE) injection vulnerability in Magicpin v3.4 allows attackers to access sensitive database information via a crafted SVG file. | ||||
CVE-2022-31261 | 1 Morpheusdata | 1 Morpheus | 2024-08-03 | 7.5 High |
An XXE issue was discovered in Morpheus through 5.2.16 and 5.4.x through 5.4.4. A successful attack requires a SAML identity provider to be configured. In order to exploit the vulnerability, the attacker must know the unique SAML callback ID of the configured identity source. A remote attacker can send a request crafted with an XXE payload to invoke a malicious DTD hosted on a system that they control. This results in reading local files that the application has access to. | ||||
CVE-2022-30971 | 1 Jenkins | 1 Storable Configs | 2024-08-03 | 8.8 High |
Jenkins Storable Configs Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | ||||
CVE-2022-29943 | 1 Talend | 1 Administration Center | 2024-08-03 | 6.5 Medium |
Talend Administration Center has a vulnerability that allows an authenticated user to use XML External Entity (XXE) processing to achieve read access as root on the remote filesystem. The issue is fixed for versions 8.0.x in TPS-5189, versions 7.3.x in TPS-5175, and versions 7.2.x in TPS-5201. Earlier versions of Talend Administration Center may also be impacted; users are encouraged to update to a supported version. | ||||
CVE-2022-29801 | 1 Siemens | 1 Teamcenter | 2024-08-03 | 7.5 High |
A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9). The application contains a XML External Entity Injection (XXE) vulnerability. This could allow an attacker to view files on the application server filesystem. | ||||
CVE-2022-29265 | 1 Apache | 1 Nifi | 2024-08-03 | 7.5 High |
Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following Processors attempt to resolve XML External Entity references when configured with default property values: - EvaluateXPath - EvaluateXQuery - ValidateXml Apache NiFi flow configurations that include these Processors are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations in the default configuration for these Processors, and disallows XML External Entity resolution in standard services. | ||||
CVE-2022-28890 | 1 Apache | 1 Jena | 2024-08-03 | 9.8 Critical |
A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena version 4.4.0 and prior versions. Apache Jena 4.2.x and 4.3.x do not allow external entities. | ||||
CVE-2022-28219 | 1 Zohocorp | 1 Manageengine Adaudit Plus | 2024-08-03 | 9.8 Critical |
Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthenticated XXE attack that leads to Remote Code Execution. |