• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

xml

  1. 1

    Exploits Citrix StoreFront Server 7.15 XML Injection

    Citrix StoreFront Server version 7.15 suffers from an XML external entity injection vulnerability. View the full article
  2. 1

    Exploits WinRAR 5.80 XML Injection

    WinRAR version 5.80 suffers from an XML external entity injection vulnerability. View the full article
  3. 1

    Exploits Tableau XML Injection

    Tableau suffers from an XML external entity injection vulnerability. View the full article
  4. 1

    Exploits Oracle Hyperion Planning 11.1.2.3 XML Injection

    Oracle Hyperion Planning version 11.1.2.3 suffer from an XML external entity injection vulnerability. View the full article
  5. 1

    Exploits Ahsay Backup 7.x / 8.x XML Injection

    Ahsay Backup versions 7.x through 8.1.1.50 suffer from an XML external entity injection vulnerability. View the full article
  6. 1

    Exploits Axway SecureTransport 5 XML Injection

    Axway SecureTransport 5 suffers from an unauthenticated XML external entity injection vulnerability. View the full article
  7. 1

    Exploits Microsoft Compiled HTML Help / Uncompiled .chm File XML External Entity Injection

    Microsoft compiled HTML Help and uncompiled .chm files can be leveraged for XML external entity injection attacks. View the full article
  8. 1

    Exploits BlogEngine.NET 3.3.6 / 3.3.7 XML Injection

    BlogEngine.NET versions 3.3.6 and 3.3.7 suffer from an XML external entity injection vulnerability. View the full article
  9. 1

    Exploits Zimbra XML Injection / Server-Side Request Forgery

    Zimbra versions prior to 8.8.1 suffer from XML external entity injection and server-side request forgery vulnerabilities. View the full article
  10. 1

    Exploits CCSP 7.2.5 API XML Injection / Server-Side Request Forgery

    Enghouse Interactive's CCSP version 7.2.5 suffers from API related XML external entity injection server-side request forgery vulnerabilities. View the full article
  11. 1

    Exploits CyberArk Enterprise Password Vault 10.7 XML External Entity Injection

    CyberArk Enterprise Password Vault versions 10.7 and below suffer from an XML external entity injection vulnerability. View the full article
  12. 1

    Exploits Oracle Business Intelligence And XML Publisher XML Injection

    Oracle Business Intelligence and XML Publisher versions 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0 suffer from an XML external entity injection vulnerability. View the full article
  13. 1

    Exploits Microsoft Internet Explorer 11 XML Injection

    Microsoft Internet Explorer 11 suffers from an XML external entity injection vulnerability. View the full article
  14. dEEpEst

    XML External Entity (XXE) 

    Hidden content
  15. 1

    Exploits DNN 9.1 XML Related Cross Site Scripting

    DNN version 9.1 suffers from a cross site scripting issue that can be achieved via an XML vulnerability. View the full article
  16. 1

    Exploits BlogEngine 3.3 XML External Entity Injection

    BlogEngine version 3.3 suffers from an XML external entity injection vulnerability. View the full article
  17. 1

    Exploits IBM Operational Decision Manager 8.x XML Injection

    IBM Operational Decision Manager version 8.x suffers from an XML external entity injection vulnerability. View the full article
  18. 1

    Exploits SDL Web Content Manager 8.5.0 XML Injection

    SDL Web Content Manager version 8.5.0 suffers from an XML external entity injection vulnerability. View the full article
  19. 1

    Exploits TufinOS 2.1.7 Build 1193 XML Injection

    TufinOS version 2.1.7 build 1193 suffers from an XML external entity injection vulnerability. View the full article
  20. 1

    Exploits Cisco WebEx Meetings Server XML Injection

    Cisco WebEx Meetings Server suffers from an XML external entity injection vulnerability. View the full article
Back
Top