Filtered by CWE-91
Filtered by vendor Subscriptions
Total 108 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2017-15683 1 Craftercms 1 Crafter Cms 2024-11-21 8.6 High
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.
CVE-2017-1000452 1 Samlify Project 1 Samlify 2024-11-21 N/A
An XML Signature Wrapping vulnerability exists in Samlify 2.2.0 and earlier, and in predecessor Express-saml2 which could allow attackers to impersonate arbitrary users.
CVE-2016-6272 1 Epic 1 Mychart 2024-11-21 N/A
XPath injection vulnerability in Epic MyChart allows remote attackers to access contents of an XML document containing static display strings, such as field labels, via the topic parameter to help.asp. NOTE: this was originally reported as a SQL injection vulnerability, but this may be inaccurate.
CVE-2015-6970 1 Boschsecurity 2 Nbn-498 Dinion2x Day\/night Ip Cameras, Nbn-498 Dinion2x Day\/night Ip Cameras Firmware 2024-11-21 9.8 Critical
The web interface in Bosch Security Systems NBN-498 Dinion2X Day/Night IP Cameras with H.264 Firmware 4.54.0026 allows remote attackers to conduct XML injection attacks via the idstring parameter to rcp.xml.
CVE-2014-1409 1 Mobileiron 2 Sentry, Virtual Smartphone Platform 2024-11-21 9.1 Critical
MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords
CVE-2013-4857 1 Dlink 2 Dir-865l, Dir-865l Firmware 2024-11-21 9.8 Critical
D-Link DIR-865L has PHP File Inclusion in the router xml file.
CVE-2024-51136 1 Openimaj 1 Openimaj 2024-11-06 9.8 Critical
An XML External Entity (XXE) vulnerability in Dmoz2CSV in openimaj v1.3.10 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted XML file.
CVE-2024-42374 2 Sap, Sap Se 2 Bex Web Java Runtime Export Web Service, Bex Web Java Runtime Export Web Service 2024-09-16 8.2 High
BEx Web Java Runtime Export Web Service does not sufficiently validate an XML document accepted from an untrusted source. An attacker can retrieve information from the SAP ADS system and exhaust the number of XMLForm service which makes the SAP ADS rendering (PDF creation) unavailable. This affects the confidentiality and availability of the application.