Vigil@nce - Vigil@nce - JDOM: external XML entity injection via SAXBuilder, analyzed on 29/06/2021
August 2021 by Vigil@nce
Vigil@nce - An attacker can transmit malicious XML data via SAXBuilder to JDOM, in order to read a file, scan sites, or trigger a denial of service.
Plus d'information sur : https://vigilance.fr/vulnerability/JDOM-external-XML-entity-injection-via-SAXBuilder-35795