Description
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Published: 2014-09-04
Score: 4.3 Medium
EPSS: 11.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5wfp-8643-c58x Improper Input Validation in Apache POI
History

No history.

Subscriptions

Apache Poi
Redhat Jboss Bpms Jboss Brms Jboss Data Virtualization Jboss Enterprise Portal Platform Jboss Fuse Service Works
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T10:50:17.790Z

Reserved: 2014-05-14T00:00:00.000Z

Link: CVE-2014-3574

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-09-04T17:55:05.670

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-3574

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-08-18T00:00:00Z

Links: CVE-2014-3574 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses