2.12.2
19 years ago
3 years ago
Known vulnerabilities in the xerces:xercesImpl package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Denial of Service (DoS) via the XML parser when handling specially crafted XML document payloads. When the parser tries to parse such a document it gets stuck in an infinite loop for a long time, which consumes resources. How to fix Denial of Service (DoS)? Upgrade | [0,2.12.2) |
xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Improper Input Validation due to the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the "use-grammar-pool-only" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as CVE-2020-14621, which affected OpenJDK, and uses a similar code. How to fix Improper Input Validation? Upgrade | [,2.12.0.SP03) |