Closed nidhi0512 closed 2 years ago
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Issue still exists.
Description
dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
HIGH Vulnerable Package issue exists @ dom4j:dom4j in branch master
Vulnerability ID: CVE-2020-10683
Package Name: dom4j:dom4j
Severity: HIGH
CVSS Score: 9.8
Publish Date: 2020-05-01T19:15:00
Current Package Version: 1.6.1
Remediation Upgrade Recommendation:
Link To SCA
Reference – NVD link