2.12.2
19 years ago
3 years ago
Known vulnerabilities in the xerces:xercesImpl package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Denial of Service (DoS) via the XML parser when handling specially crafted XML document payloads. When the parser tries to parse such a document it gets stuck in an infinite loop for a long time, which consumes resources. How to fix Denial of Service (DoS)? Upgrade | [0,2.12.2) |
xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Improper Input Validation due to the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the "use-grammar-pool-only" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as CVE-2020-14621, which affected OpenJDK, and uses a similar code. How to fix Improper Input Validation? Upgrade | [,2.12.0.SP03) |
xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Denial of Service (DoS). Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. How to fix Denial of Service (DoS)? Upgrade | [,2.12.0) |
xerces:xercesImpl is an that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Denial of Service (DoS).
How to fix Denial of Service (DoS)? Upgrade | [,2.10.0) |
xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Denial of Service (DoS). Apache Xerces2 Java allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions. How to fix Denial of Service (DoS)? Upgrade | [0,2.12.0) |
xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Denial of Service (DoS). An attacker may be able to force the target server to parse an FTP URL, which points to an FTP server controller by the attacker. When the target server is mid way through fetching the FTP resources, the attackers malicious FTP server will exit the process and will leave the thread hanging in the target server. It is possible to conduct this attack only if the following conditions are met:
How to fix Denial of Service (DoS)? Upgrade | [,2.11.0) |
xerces:xercesImpl is a that is used for high performance, fully compliant XML parsers in the Apache Xerces family. Affected versions of this package are vulnerable to Denial of Service (DoS) which is caused by the way the JRE processes XML files. A remote attacker could use this flaw to supply crafted XML that would lead to a denial of service. How to fix Denial of Service (DoS)? Upgrade | [,2.11.0.SP5) |