9 results (0.013 seconds)

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1. • https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j https://security.netapp.com/advisory/ntap-20221028-0006 https://access.redhat.com/security/cve/CVE-2022-26336 https://bugzilla.redhat.com/show_bug.cgi?id=2063292 • CWE-20: Improper Input Validation CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 5.5EPSS: 0%CPEs: 65EXPL: 0

In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing. En Apache POI versiones hasta 4.1.0, cuando se utiliza la herramienta XSSFExportToXml para convertir documentos de Microsoft Excel proporcionados por el usuario, un documento especialmente diseñado puede permitir a un atacante leer archivos del sistema de archivos local o de los recursos de la red interna por medio de un Procesamiento de Entidad Externa XML (XXE). • https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295). Apache POI, en versiones anteriores al release 3.17, es vulnerable a ataques de denegación de servicio (DoS): 1) bucles infinitos al analizar WMF, EMF, MSG y macros manipuladas (POI bugs 61338 y 61294); y 2) excepciones fuera de memoria al analizar DOC, PPT y XLS manipulados(POI bugs 52372 y 61295). • http://www.securityfocus.com/bid/102879 https://access.redhat.com/errata/RHSA-2018:1322 https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/se • CWE-20: Improper Input Validation CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.1EPSS: 1%CPEs: 1EXPL: 0

Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack. Apache POI en versiones anteriores al lanzamiento 3.15 permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) a través de un archivo OOXML especialmente manipulado, vulnerabilidad también conocida como un ataque de XML Entity Expansion (XEE). • http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15 http://www.securityfocus.com/bid/96983 https://www.oracle.com/security-alerts/cpuoct2020.html • CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. El ejemplo XLSX2CSV en Apache POI en versiones anteriores a 3.14 permite a atacantes remotos leer archivos arbitrarios a través de un documento OpenXML manipulado que contiene una declaración de entidad externa en relación con una referencia a entidad, relacionado con un problema XML External Entity (XXE). • http://www-01.ibm.com/support/docview.wss?uid=swg21996759 http://www.securityfocus.com/archive/1/538981/100/0/threaded http://www.securityfocus.com/bid/92100 http://www.securitytracker.com/id/1037741 https://lists.apache.org/list.html?user%40poi.apache.org https://www.oracle.com/security-alerts/cpuoct2020.html • CWE-611: Improper Restriction of XML External Entity Reference •