Update CVE-2020-11991.yaml
parent
e0271e045a
commit
a74a2b3f28
|
@ -1,7 +1,7 @@
|
||||||
id: CVE-2020-11991
|
id: CVE-2020-11991
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Cocoon 2.1.12 XML Injection
|
name: Apache Cocoon 2.1.12 - XML Injection
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
description: Apache Cocoon 2.1.12 is susceptible to XML injection. When using the StreamGenerator, the code parses a user-provided XML. A specially crafted XML, including external system entities, can be used to access any file on the server system.
|
description: Apache Cocoon 2.1.12 is susceptible to XML injection. When using the StreamGenerator, the code parses a user-provided XML. A specially crafted XML, including external system entities, can be used to access any file on the server system.
|
||||||
|
|
Loading…
Reference in New Issue