Vulnerabilites related to apache - poi
CVE-2022-26336 (GCVE-0-2022-26336)
Vulnerability from cvelistv5
Published
2022-03-04 00:00
Modified
2024-08-03 05:03
Severity ?
Summary
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T05:03:32.643Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20221028-0006/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "poi-scratchpad",
               vendor: "Apache Software Foundation",
               versions: [
                  {
                     lessThanOrEqual: "5.2.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Apache POI would like to thank Craig Haft of Yahoo Inc. for reporting and providing a patch for this issue.",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     other: "moderate",
                  },
                  type: "unknown",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-770",
                     description: "CWE-770 Allocation of Resources Without Limits or Throttling",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20 Improper Input Validation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-28T00:00:00",
            orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
            shortName: "apache",
         },
         references: [
            {
               url: "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20221028-0006/",
            },
         ],
         source: {
            defect: [
               "https://bz.apache.org/bugzilla/show_bug.cgi?id=65899",
            ],
            discovery: "UNKNOWN",
         },
         title: "A carefully crafted TNEF file can cause an out of memory exception",
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
      assignerShortName: "apache",
      cveId: "CVE-2022-26336",
      datePublished: "2022-03-04T00:00:00",
      dateReserved: "2022-03-01T00:00:00",
      dateUpdated: "2024-08-03T05:03:32.643Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-3529 (GCVE-0-2014-3529)
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:50
Severity ?
Summary
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T10:50:16.343Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://poi.apache.org/changes.html",
               },
               {
                  name: "78018",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/78018",
               },
               {
                  name: "61766",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61766",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
               },
               {
                  name: "apache-poi-cve20143529-info-disc(95770)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770",
               },
               {
                  name: "RHSA-2014:1370",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
               },
               {
                  name: "60419",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60419",
               },
               {
                  name: "RHSA-2014:1400",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
               },
               {
                  name: "69647",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/69647",
               },
               {
                  name: "RHSA-2014:1398",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
               },
               {
                  name: "59943",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59943",
               },
               {
                  name: "RHSA-2014:1399",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-04T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-28T12:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://poi.apache.org/changes.html",
            },
            {
               name: "78018",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/78018",
            },
            {
               name: "61766",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61766",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
            },
            {
               name: "apache-poi-cve20143529-info-disc(95770)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770",
            },
            {
               name: "RHSA-2014:1370",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
            },
            {
               name: "60419",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60419",
            },
            {
               name: "RHSA-2014:1400",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
            },
            {
               name: "69647",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/69647",
            },
            {
               name: "RHSA-2014:1398",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
            },
            {
               name: "59943",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59943",
            },
            {
               name: "RHSA-2014:1399",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2014-3529",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                  },
                  {
                     name: "http://poi.apache.org/changes.html",
                     refsource: "CONFIRM",
                     url: "http://poi.apache.org/changes.html",
                  },
                  {
                     name: "78018",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/78018",
                  },
                  {
                     name: "61766",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61766",
                  },
                  {
                     name: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
                     refsource: "CONFIRM",
                     url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
                  },
                  {
                     name: "apache-poi-cve20143529-info-disc(95770)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770",
                  },
                  {
                     name: "RHSA-2014:1370",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
                  },
                  {
                     name: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
                     refsource: "CONFIRM",
                     url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
                  },
                  {
                     name: "60419",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60419",
                  },
                  {
                     name: "RHSA-2014:1400",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
                  },
                  {
                     name: "69647",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/69647",
                  },
                  {
                     name: "RHSA-2014:1398",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
                  },
                  {
                     name: "59943",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59943",
                  },
                  {
                     name: "RHSA-2014:1399",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2014-3529",
      datePublished: "2014-09-04T17:00:00",
      dateReserved: "2014-05-14T00:00:00",
      dateUpdated: "2024-08-06T10:50:16.343Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-12626 (GCVE-0-2017-12626)
Vulnerability from cvelistv5
Published
2018-01-29 17:00
Modified
2024-09-16 18:45
Severity ?
Summary
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T18:43:56.421Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2018:1322",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1322",
               },
               {
                  name: "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI < 3.17",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E",
               },
               {
                  name: "102879",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/102879",
               },
               {
                  name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujul2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Apache POI",
               vendor: "Apache Software Foundation",
               versions: [
                  {
                     status: "affected",
                     version: "< 3.17",
                  },
               ],
            },
         ],
         datePublic: "2018-01-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service Vulnerabilities",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-06-14T17:20:03",
            orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
            shortName: "apache",
         },
         references: [
            {
               name: "RHSA-2018:1322",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:1322",
            },
            {
               name: "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI < 3.17",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E",
            },
            {
               name: "102879",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/102879",
            },
            {
               name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujul2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@apache.org",
               DATE_PUBLIC: "2018-01-26T00:00:00",
               ID: "CVE-2017-12626",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Apache POI",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "< 3.17",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Apache Software Foundation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service Vulnerabilities",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2018:1322",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:1322",
                  },
                  {
                     name: "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI < 3.17",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E",
                  },
                  {
                     name: "102879",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/102879",
                  },
                  {
                     name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuapr2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujul2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujul2020.html",
                  },
                  {
                     name: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2020.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
      assignerShortName: "apache",
      cveId: "CVE-2017-12626",
      datePublished: "2018-01-29T17:00:00Z",
      dateReserved: "2017-08-07T00:00:00",
      dateUpdated: "2024-09-16T18:45:21.181Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-5644 (GCVE-0-2017-5644)
Vulnerability from cvelistv5
Published
2017-03-24 14:00
Modified
2024-08-05 15:11
Severity ?
Summary
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:11:47.262Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "96983",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/96983",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Apache POI",
               vendor: "Apache Software Foundation",
               versions: [
                  {
                     status: "affected",
                     version: "before 3.15",
                  },
               ],
            },
         ],
         datePublic: "2017-03-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "XXE",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-20T21:14:51",
            orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
            shortName: "apache",
         },
         references: [
            {
               name: "96983",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/96983",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@apache.org",
               ID: "CVE-2017-5644",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Apache POI",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "before 3.15",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Apache Software Foundation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "XXE",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "96983",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/96983",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  },
                  {
                     name: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15",
                     refsource: "CONFIRM",
                     url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
      assignerShortName: "apache",
      cveId: "CVE-2017-5644",
      datePublished: "2017-03-24T14:00:00",
      dateReserved: "2017-01-29T00:00:00",
      dateUpdated: "2024-08-05T15:11:47.262Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2012-0213 (GCVE-0-2012-0213)
Vulnerability from cvelistv5
Published
2012-08-07 21:00
Modified
2024-08-06 18:16
Severity ?
Summary
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T18:16:19.382Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
               },
               {
                  name: "49040",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49040",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044",
               },
               {
                  name: "DSA-2468",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2012/dsa-2468",
               },
               {
                  name: "50549",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/50549",
               },
               {
                  name: "FEDORA-2012-10835",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html",
               },
               {
                  name: "53487",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/53487",
               },
               {
                  name: "RHSA-2012:1232",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
               },
               {
                  name: "MDVSA-2013:094",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-05-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-02-10T21:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
            },
            {
               name: "49040",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49040",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044",
            },
            {
               name: "DSA-2468",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2012/dsa-2468",
            },
            {
               name: "50549",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/50549",
            },
            {
               name: "FEDORA-2012-10835",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html",
            },
            {
               name: "53487",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/53487",
            },
            {
               name: "RHSA-2012:1232",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
            },
            {
               name: "MDVSA-2013:094",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2012-0213",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                  },
                  {
                     name: "49040",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/49040",
                  },
                  {
                     name: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044",
                     refsource: "CONFIRM",
                     url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044",
                  },
                  {
                     name: "DSA-2468",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2012/dsa-2468",
                  },
                  {
                     name: "50549",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/50549",
                  },
                  {
                     name: "FEDORA-2012-10835",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html",
                  },
                  {
                     name: "53487",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/53487",
                  },
                  {
                     name: "RHSA-2012:1232",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
                  },
                  {
                     name: "MDVSA-2013:094",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=799078",
                     refsource: "MISC",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2012-0213",
      datePublished: "2012-08-07T21:00:00",
      dateReserved: "2011-12-14T00:00:00",
      dateUpdated: "2024-08-06T18:16:19.382Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-3574 (GCVE-0-2014-3574)
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:50
Severity ?
Summary
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T10:50:17.790Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
               },
               {
                  name: "69648",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/69648",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://poi.apache.org/changes.html",
               },
               {
                  name: "61766",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61766",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
               },
               {
                  name: "RHSA-2014:1370",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
               },
               {
                  name: "60419",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/60419",
               },
               {
                  name: "apache-poi-cve20143574-dos(95768)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768",
               },
               {
                  name: "RHSA-2014:1400",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
               },
               {
                  name: "RHSA-2014:1398",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
               },
               {
                  name: "59943",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/59943",
               },
               {
                  name: "RHSA-2014:1399",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-08-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-28T12:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
            },
            {
               name: "69648",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/69648",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://poi.apache.org/changes.html",
            },
            {
               name: "61766",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61766",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
            },
            {
               name: "RHSA-2014:1370",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
            },
            {
               name: "60419",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/60419",
            },
            {
               name: "apache-poi-cve20143574-dos(95768)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768",
            },
            {
               name: "RHSA-2014:1400",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
            },
            {
               name: "RHSA-2014:1398",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
            },
            {
               name: "59943",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/59943",
            },
            {
               name: "RHSA-2014:1399",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2014-3574",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                  },
                  {
                     name: "69648",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/69648",
                  },
                  {
                     name: "http://poi.apache.org/changes.html",
                     refsource: "CONFIRM",
                     url: "http://poi.apache.org/changes.html",
                  },
                  {
                     name: "61766",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61766",
                  },
                  {
                     name: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
                     refsource: "CONFIRM",
                     url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
                  },
                  {
                     name: "RHSA-2014:1370",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
                  },
                  {
                     name: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
                     refsource: "CONFIRM",
                     url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
                  },
                  {
                     name: "60419",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/60419",
                  },
                  {
                     name: "apache-poi-cve20143574-dos(95768)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768",
                  },
                  {
                     name: "RHSA-2014:1400",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
                  },
                  {
                     name: "RHSA-2014:1398",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
                  },
                  {
                     name: "59943",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/59943",
                  },
                  {
                     name: "RHSA-2014:1399",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2014-3574",
      datePublished: "2014-09-04T17:00:00",
      dateReserved: "2014-05-14T00:00:00",
      dateUpdated: "2024-08-06T10:50:17.790Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-12415 (GCVE-0-2019-12415)
Vulnerability from cvelistv5
Published
2019-10-23 19:27
Modified
2024-08-04 23:17
Severity ?
Summary
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
Impacted products
Vendor Product Version
n/a Apache POI Version: Apache POI up to 4.1.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T23:17:40.071Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E",
               },
               {
                  name: "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E",
               },
               {
                  name: "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E",
               },
               {
                  name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujul2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com//security-alerts/cpujul2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Apache POI",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Apache POI up to 4.1.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-20T10:38:23",
            orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
            shortName: "apache",
         },
         references: [
            {
               name: "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E",
            },
            {
               name: "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E",
            },
            {
               name: "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E",
            },
            {
               name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujul2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com//security-alerts/cpujul2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@apache.org",
               ID: "CVE-2019-12415",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Apache POI",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Apache POI up to 4.1.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c@%3Cuser.tika.apache.org%3E",
                  },
                  {
                     name: "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007@%3Cuser.tika.apache.org%3E",
                  },
                  {
                     name: "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c@%3Cuser.tika.apache.org%3E",
                  },
                  {
                     name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuapr2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujul2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujul2020.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2020.html",
                  },
                  {
                     name: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E",
                     refsource: "MISC",
                     url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                  },
                  {
                     name: "https://www.oracle.com//security-alerts/cpujul2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com//security-alerts/cpujul2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
      assignerShortName: "apache",
      cveId: "CVE-2019-12415",
      datePublished: "2019-10-23T19:27:20",
      dateReserved: "2019-05-28T00:00:00",
      dateUpdated: "2024-08-04T23:17:40.071Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-5000 (GCVE-0-2016-5000)
Vulnerability from cvelistv5
Published
2016-08-05 14:00
Modified
2024-08-06 00:46
Severity ?
Summary
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T00:46:40.237Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded",
               },
               {
                  name: "92100",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/92100",
               },
               {
                  name: "1037741",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1037741",
               },
               {
                  name: "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/list.html?user%40poi.apache.org",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-07-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-10-20T21:14:51",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded",
            },
            {
               name: "92100",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/92100",
            },
            {
               name: "1037741",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1037741",
            },
            {
               name: "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/list.html?user%40poi.apache.org",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2016-5000",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded",
                  },
                  {
                     name: "92100",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/92100",
                  },
                  {
                     name: "1037741",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1037741",
                  },
                  {
                     name: "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/list.html?user@poi.apache.org",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2016-5000",
      datePublished: "2016-08-05T14:00:00",
      dateReserved: "2016-05-24T00:00:00",
      dateUpdated: "2024-08-06T00:46:40.237Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-9527 (GCVE-0-2014-9527)
Vulnerability from cvelistv5
Published
2015-01-06 15:00
Modified
2024-08-06 13:47
Severity ?
Summary
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:47:41.391Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
               },
               {
                  name: "RHSA-2016:1135",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2016:1135",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://poi.apache.org/changes.html",
               },
               {
                  name: "77726",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/77726",
               },
               {
                  name: "61953",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/61953",
               },
               {
                  name: "FEDORA-2015-2090",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-12-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-02-10T21:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
            },
            {
               name: "RHSA-2016:1135",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2016:1135",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://poi.apache.org/changes.html",
            },
            {
               name: "77726",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/77726",
            },
            {
               name: "61953",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/61953",
            },
            {
               name: "FEDORA-2015-2090",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2014-9527",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
                  },
                  {
                     name: "RHSA-2016:1135",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2016:1135",
                  },
                  {
                     name: "http://poi.apache.org/changes.html",
                     refsource: "CONFIRM",
                     url: "http://poi.apache.org/changes.html",
                  },
                  {
                     name: "77726",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/77726",
                  },
                  {
                     name: "61953",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/61953",
                  },
                  {
                     name: "FEDORA-2015-2090",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html",
                  },
                  {
                     name: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272",
                     refsource: "CONFIRM",
                     url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2014-9527",
      datePublished: "2015-01-06T15:00:00",
      dateReserved: "2015-01-06T00:00:00",
      dateUpdated: "2024-08-06T13:47:41.391Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2012-08-07 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
References
security@debian.orghttp://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html
security@debian.orghttp://rhn.redhat.com/errata/RHSA-2012-1232.html
security@debian.orghttp://secunia.com/advisories/49040Vendor Advisory
security@debian.orghttp://secunia.com/advisories/50549
security@debian.orghttp://www-01.ibm.com/support/docview.wss?uid=swg21996759
security@debian.orghttp://www.debian.org/security/2012/dsa-2468
security@debian.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2013:094
security@debian.orghttp://www.securityfocus.com/bid/53487
security@debian.orghttps://bugzilla.redhat.com/show_bug.cgi?id=799078
security@debian.orghttps://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-1232.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49040Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50549
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21996759
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2468
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:094
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/53487
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=799078
af854a3a-2127-422b-91ae-364da2661108https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044
Impacted products
Vendor Product Version
apache poi *
apache poi 0.1
apache poi 0.2
apache poi 0.3
apache poi 0.4
apache poi 0.5
apache poi 0.6
apache poi 0.7
apache poi 0.10.0
apache poi 0.11.0
apache poi 0.12.0
apache poi 0.13.0
apache poi 0.14.0
apache poi 1.0.0
apache poi 1.0.1
apache poi 1.0.2
apache poi 1.1.0
apache poi 1.2.0
apache poi 1.5
apache poi 1.5.1
apache poi 1.7
apache poi 1.8
apache poi 1.10
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.5
apache poi 2.5.1
apache poi 3.0
apache poi 3.0
apache poi 3.0
apache poi 3.0
apache poi 3.0.1
apache poi 3.0.2
apache poi 3.0.2
apache poi 3.0.2
apache poi 3.1
apache poi 3.1
apache poi 3.1
apache poi 3.2
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.6
apache poi 3.7
apache poi 3.7
apache poi 3.7
apache poi 3.7
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.8



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CDF1F8B-7A6A-4938-A36C-02985A7299C9",
                     versionEndIncluding: "3.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE2279A-42D7-4FBE-A732-55950225E450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B4D079D-DDA3-41D4-9B19-05BBF8E50095",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEDD83D8-2668-4693-A7FB-48F09E1764F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF5C9105-FC01-475F-9D89-6A91FBF2949F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C858F25-4858-41C6-9BCB-9665D21F265E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6724EEA0-E884-4884-8097-7F833BE58AE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "81846632-36FF-4149-BCA0-C22B65F220A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "75DF4E14-87F4-4AF0-9DF8-E1DA10948255",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "148DF854-533C-48DF-ACF2-13A6A07D03EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08B2CFF-6357-4830-B5F5-C335B4975E19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECEF1F3B-CE2F-4F6B-A78E-38A340092796",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "19F54B1C-8894-44F5-AFEC-D0E2863EDB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "256470D1-508C-4B0E-B7A3-B2E6357D2372",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B95965-17EE-4BCF-BFC1-75FEC936F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A135A468-8408-4396-8493-CF62C642F1B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*",
                     matchCriteriaId: "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*",
                     matchCriteriaId: "A2200AC8-A934-45FF-8C38-B4826CEB68E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*",
                     matchCriteriaId: "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0395450F-5486-425C-B6BE-549F2CE24C13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "EC948D61-A860-4E8E-975D-B19929AD27EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "1093F797-CF22-4E3D-8F54-3E8F3E7059F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "602F0B28-D553-4F29-BFCB-7F4A409E40F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "3202EBFB-B547-4BA2-8219-E00A86995D3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "4466C398-24F7-442F-9327-94E52B73FA7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A7F3423-7636-43DB-8C50-DB83A42D5CFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "05CE5511-6C01-4E19-A351-88B7A944531D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "80482643-A5E8-4585-BAD7-E30B40F2552E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "258A5FF1-C199-4775-9ACC-902D649E751E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*",
                     matchCriteriaId: "22591C38-3610-4910-ABE5-1574446F6650",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "4855870F-388F-4E72-A4F8-AAE61187A433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "BD88A7B3-23BE-411E-9415-B47B5896FFD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E19E7943-2097-4C17-B344-948AB45CA308",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "45B1D735-DC16-4B1A-A21D-599E7F12651C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "F0004217-3B76-48B1-97F7-F0E548FBD6D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "392805F3-3B33-4E20-8108-6ED62DFE7480",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "AE4F139F-2003-453F-9D09-DBD4F2AEE31C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "418B65CF-9DB9-4A84-9872-4C87CC3DA76E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*",
                     matchCriteriaId: "CB86DA57-CE46-4651-84E1-409F2375A997",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*",
                     matchCriteriaId: "53A87A07-867B-48A9-BC89-47844EF461C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA8F24BA-849D-4C37-8094-EF2B6ABE4493",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F6C7373-073C-4F4E-859A-4EF82EF6FB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DC7693A6-11AC-4BF9-9307-49D028F19885",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0D435C18-BB4B-4023-8A52-49D44F1A7E9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "E585E98A-EB9A-492F-8902-85D99AC8E554",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*",
                     matchCriteriaId: "258BC823-5828-44B4-AFF5-A7E49281FD10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.",
      },
      {
         lang: "es",
         value: "La función UnhandledDataStructure en hwpf/model/UnhandledDataStructure.java en Apache POI v3.8 y anteriores permite a atacantes remotos earlier provocar una denegación de servicio (excepción OutOfMemoryError y posiblemente desestabilización JVM) mediante un valor de longitud manipulado en un Channel Definition Format (CDF) o en un documento Compound File Binary Format (CFBF).",
      },
   ],
   id: "CVE-2012-0213",
   lastModified: "2025-04-11T00:51:21.963",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-08-07T21:55:01.093",
   references: [
      {
         source: "security@debian.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html",
      },
      {
         source: "security@debian.org",
         url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
      },
      {
         source: "security@debian.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/49040",
      },
      {
         source: "security@debian.org",
         url: "http://secunia.com/advisories/50549",
      },
      {
         source: "security@debian.org",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "security@debian.org",
         url: "http://www.debian.org/security/2012/dsa-2468",
      },
      {
         source: "security@debian.org",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094",
      },
      {
         source: "security@debian.org",
         url: "http://www.securityfocus.com/bid/53487",
      },
      {
         source: "security@debian.org",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078",
      },
      {
         source: "security@debian.org",
         url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/49040",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/50549",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2012/dsa-2468",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/53487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=799078",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
secalert@redhat.comhttp://poi.apache.org/changes.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1370.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1398.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1399.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1400.html
secalert@redhat.comhttp://secunia.com/advisories/59943
secalert@redhat.comhttp://secunia.com/advisories/60419
secalert@redhat.comhttp://secunia.com/advisories/61766
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21996759
secalert@redhat.comhttp://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
secalert@redhat.comhttp://www.securityfocus.com/bid/69647
secalert@redhat.comhttp://www.securityfocus.com/bid/78018
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/95770
secalert@redhat.comhttps://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installationsVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://poi.apache.org/changes.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1370.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1398.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1399.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1400.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59943
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60419
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61766
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21996759
af854a3a-2127-422b-91ae-364da2661108http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/69647
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/78018
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/95770
af854a3a-2127-422b-91ae-364da2661108https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installationsVendor Advisory
Impacted products
Vendor Product Version
apache poi *
apache poi 0.1
apache poi 0.2
apache poi 0.3
apache poi 0.4
apache poi 0.5
apache poi 0.6
apache poi 0.7
apache poi 0.10.0
apache poi 0.11.0
apache poi 0.12.0
apache poi 0.13.0
apache poi 0.14.0
apache poi 1.0.0
apache poi 1.0.1
apache poi 1.0.2
apache poi 1.1.0
apache poi 1.2.0
apache poi 1.5
apache poi 1.5.1
apache poi 1.7
apache poi 1.8
apache poi 1.10
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.5
apache poi 2.5.1
apache poi 3.0
apache poi 3.0
apache poi 3.0
apache poi 3.0
apache poi 3.0.1
apache poi 3.0.2
apache poi 3.0.2
apache poi 3.0.2
apache poi 3.1
apache poi 3.1
apache poi 3.1
apache poi 3.2
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.6
apache poi 3.7
apache poi 3.7
apache poi 3.7
apache poi 3.7
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.9
apache poi 3.10
apache poi 3.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F",
                     versionEndIncluding: "3.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE2279A-42D7-4FBE-A732-55950225E450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B4D079D-DDA3-41D4-9B19-05BBF8E50095",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEDD83D8-2668-4693-A7FB-48F09E1764F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF5C9105-FC01-475F-9D89-6A91FBF2949F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C858F25-4858-41C6-9BCB-9665D21F265E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6724EEA0-E884-4884-8097-7F833BE58AE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "81846632-36FF-4149-BCA0-C22B65F220A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "75DF4E14-87F4-4AF0-9DF8-E1DA10948255",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "148DF854-533C-48DF-ACF2-13A6A07D03EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08B2CFF-6357-4830-B5F5-C335B4975E19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECEF1F3B-CE2F-4F6B-A78E-38A340092796",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "19F54B1C-8894-44F5-AFEC-D0E2863EDB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "256470D1-508C-4B0E-B7A3-B2E6357D2372",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B95965-17EE-4BCF-BFC1-75FEC936F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A135A468-8408-4396-8493-CF62C642F1B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*",
                     matchCriteriaId: "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*",
                     matchCriteriaId: "A2200AC8-A934-45FF-8C38-B4826CEB68E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*",
                     matchCriteriaId: "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0395450F-5486-425C-B6BE-549F2CE24C13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "EC948D61-A860-4E8E-975D-B19929AD27EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "1093F797-CF22-4E3D-8F54-3E8F3E7059F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "602F0B28-D553-4F29-BFCB-7F4A409E40F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "3202EBFB-B547-4BA2-8219-E00A86995D3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "4466C398-24F7-442F-9327-94E52B73FA7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A7F3423-7636-43DB-8C50-DB83A42D5CFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "05CE5511-6C01-4E19-A351-88B7A944531D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "80482643-A5E8-4585-BAD7-E30B40F2552E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "258A5FF1-C199-4775-9ACC-902D649E751E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*",
                     matchCriteriaId: "22591C38-3610-4910-ABE5-1574446F6650",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "4855870F-388F-4E72-A4F8-AAE61187A433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "BD88A7B3-23BE-411E-9415-B47B5896FFD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E19E7943-2097-4C17-B344-948AB45CA308",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "45B1D735-DC16-4B1A-A21D-599E7F12651C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "F0004217-3B76-48B1-97F7-F0E548FBD6D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "392805F3-3B33-4E20-8108-6ED62DFE7480",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "AE4F139F-2003-453F-9D09-DBD4F2AEE31C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "418B65CF-9DB9-4A84-9872-4C87CC3DA76E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*",
                     matchCriteriaId: "CB86DA57-CE46-4651-84E1-409F2375A997",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*",
                     matchCriteriaId: "53A87A07-867B-48A9-BC89-47844EF461C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA8F24BA-849D-4C37-8094-EF2B6ABE4493",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F6C7373-073C-4F4E-859A-4EF82EF6FB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DC7693A6-11AC-4BF9-9307-49D028F19885",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0D435C18-BB4B-4023-8A52-49D44F1A7E9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1501370-BC00-4456-9A52-EE4E9899567A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "E585E98A-EB9A-492F-8902-85D99AC8E554",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*",
                     matchCriteriaId: "258BC823-5828-44B4-AFF5-A7E49281FD10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DD7E734A-22C1-4895-AE1F-2EB87126EBA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
      },
      {
         lang: "es",
         value: "La configuración de OPC SAX en Apache POI anterior a 3.10.1 permite a atacantes remotos leer ficheros arbitrarios a través de un fichero OpenXML que contiene una declaración de entidad externa XML en conjunto con una referencia de entidad, relacionado con un problema de entidad externa XML (XXE).",
      },
   ],
   evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>",
   id: "CVE-2014-3529",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-09-04T17:55:05.623",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://poi.apache.org/changes.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/59943",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/60419",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/61766",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/69647",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/78018",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://poi.apache.org/changes.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/59943",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/60419",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61766",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/69647",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/78018",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-01-06 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
Impacted products
Vendor Product Version
fedoraproject fedora 20
apache poi *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "0E4D7997-8DE0-4D93-8C8C-E9D8EF6BC1F8",
                     versionEndIncluding: "3.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.",
      },
      {
         lang: "es",
         value: "HSLFSlideShow en Apache POI anterior a 3.11 permite a atacantes remotos causar una denegación de servicio (bucle infinito y bloqueo) a través de un fichero PPT manipulado.",
      },
   ],
   id: "CVE-2014-9527",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-01-06T15:59:05.727",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://poi.apache.org/changes.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/61953",
      },
      {
         source: "cve@mitre.org",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/77726",
      },
      {
         source: "cve@mitre.org",
         url: "https://access.redhat.com/errata/RHSA-2016:1135",
      },
      {
         source: "cve@mitre.org",
         url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://poi.apache.org/changes.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61953",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/77726",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://access.redhat.com/errata/RHSA-2016:1135",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-03-04 16:15
Modified
2024-11-21 06:53
Summary
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A853FEC8-0927-4637-A352-BB91914AFFCD",
                     versionEndExcluding: "5.2.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
                     matchCriteriaId: "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                     matchCriteriaId: "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                     matchCriteriaId: "B55E8D50-99B4-47EC-86F9-699B67D473CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.",
      },
      {
         lang: "es",
         value: "Un fallo en el paquete HMEF de poi-scratchpad (Apache POI) permite a un atacante causar una excepción de Falta de Memoria. Este paquete es usado para leer archivos TNEF (Microsoft Outlook y Microsoft Exchange Server). Si una aplicación usa poi-scratchpad para analizar archivos TNEF y la aplicación permite que usuarios no confiables los suministren, entonces un archivo cuidadosamente diseñado puede causar una excepción de Falta de Memoria. Este problema afecta a versión 5.2.0 de poi-scratchpad y versiones anteriores. Es recomendado a usuarios actualizar a poi-scratchpad versión 5.2.1",
      },
   ],
   id: "CVE-2022-26336",
   lastModified: "2024-11-21T06:53:46.477",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-03-04T16:15:10.923",
   references: [
      {
         source: "security@apache.org",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221028-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20221028-0006/",
      },
   ],
   sourceIdentifier: "security@apache.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "security@apache.org",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-01-29 17:29
Modified
2024-11-21 03:09
Summary
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
References
security@apache.orghttp://www.securityfocus.com/bid/102879Third Party Advisory, VDB Entry
security@apache.orghttps://access.redhat.com/errata/RHSA-2018:1322Third Party Advisory
security@apache.orghttps://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E
security@apache.orghttps://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
security@apache.orghttps://www.oracle.com/security-alerts/cpuApr2021.html
security@apache.orghttps://www.oracle.com/security-alerts/cpuapr2020.html
security@apache.orghttps://www.oracle.com/security-alerts/cpujan2020.html
security@apache.orghttps://www.oracle.com/security-alerts/cpujan2021.html
security@apache.orghttps://www.oracle.com/security-alerts/cpujul2020.html
security@apache.orghttps://www.oracle.com/security-alerts/cpuoct2020.html
security@apache.orghttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/102879Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:1322Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuApr2021.html
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuapr2020.html
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2020.html
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.html
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujul2020.html
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2020.html
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Impacted products
Vendor Product Version
apache poi *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C04149C-A260-4129-93DE-EA5815189C17",
                     versionEndExcluding: "3.17",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).",
      },
      {
         lang: "es",
         value: "Apache POI, en versiones anteriores al release 3.17, es vulnerable a ataques de denegación de servicio (DoS): 1) bucles infinitos al analizar WMF, EMF, MSG y macros manipuladas (POI bugs 61338 y 61294); y 2) excepciones fuera de memoria al analizar DOC, PPT y XLS manipulados(POI bugs 52372 y 61295).",
      },
   ],
   id: "CVE-2017-12626",
   lastModified: "2024-11-21T03:09:55.420",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-01-29T17:29:00.410",
   references: [
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/102879",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:1322",
      },
      {
         source: "security@apache.org",
         url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E",
      },
      {
         source: "security@apache.org",
         url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "security@apache.org",
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "security@apache.org",
         url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
      },
      {
         source: "security@apache.org",
         url: "https://www.oracle.com/security-alerts/cpujan2020.html",
      },
      {
         source: "security@apache.org",
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "security@apache.org",
         url: "https://www.oracle.com/security-alerts/cpujul2020.html",
      },
      {
         source: "security@apache.org",
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "security@apache.org",
         url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/102879",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:1322",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpujan2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpujul2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
      },
   ],
   sourceIdentifier: "security@apache.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-835",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
secalert@redhat.comhttp://poi.apache.org/changes.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1370.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1398.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1399.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-1400.html
secalert@redhat.comhttp://secunia.com/advisories/59943
secalert@redhat.comhttp://secunia.com/advisories/60419
secalert@redhat.comhttp://secunia.com/advisories/61766
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21996759
secalert@redhat.comhttp://www.apache.org/dist/poi/release/RELEASE-NOTES.txtVendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/69648
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/95768
secalert@redhat.comhttps://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installationsPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://poi.apache.org/changes.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1370.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1398.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1399.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1400.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59943
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60419
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61766
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21996759
af854a3a-2127-422b-91ae-364da2661108http://www.apache.org/dist/poi/release/RELEASE-NOTES.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/69648
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/95768
af854a3a-2127-422b-91ae-364da2661108https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installationsPatch, Vendor Advisory
Impacted products
Vendor Product Version
apache poi *
apache poi 0.1
apache poi 0.2
apache poi 0.3
apache poi 0.4
apache poi 0.5
apache poi 0.6
apache poi 0.7
apache poi 0.10.0
apache poi 0.11.0
apache poi 0.12.0
apache poi 0.13.0
apache poi 0.14.0
apache poi 1.0.0
apache poi 1.0.1
apache poi 1.0.2
apache poi 1.1.0
apache poi 1.2.0
apache poi 1.5
apache poi 1.5.1
apache poi 1.7
apache poi 1.8
apache poi 1.10
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.0
apache poi 2.5
apache poi 2.5.1
apache poi 3.0
apache poi 3.0
apache poi 3.0
apache poi 3.0
apache poi 3.0.1
apache poi 3.0.2
apache poi 3.0.2
apache poi 3.0.2
apache poi 3.1
apache poi 3.1
apache poi 3.1
apache poi 3.2
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.5
apache poi 3.6
apache poi 3.7
apache poi 3.7
apache poi 3.7
apache poi 3.7
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.8
apache poi 3.9
apache poi 3.10
apache poi 3.10
apache poi 3.11



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F",
                     versionEndIncluding: "3.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE2279A-42D7-4FBE-A732-55950225E450",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B4D079D-DDA3-41D4-9B19-05BBF8E50095",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEDD83D8-2668-4693-A7FB-48F09E1764F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF5C9105-FC01-475F-9D89-6A91FBF2949F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C858F25-4858-41C6-9BCB-9665D21F265E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6724EEA0-E884-4884-8097-7F833BE58AE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "81846632-36FF-4149-BCA0-C22B65F220A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "75DF4E14-87F4-4AF0-9DF8-E1DA10948255",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "148DF854-533C-48DF-ACF2-13A6A07D03EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08B2CFF-6357-4830-B5F5-C335B4975E19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECEF1F3B-CE2F-4F6B-A78E-38A340092796",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "19F54B1C-8894-44F5-AFEC-D0E2863EDB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "256470D1-508C-4B0E-B7A3-B2E6357D2372",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "57B95965-17EE-4BCF-BFC1-75FEC936F756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A135A468-8408-4396-8493-CF62C642F1B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*",
                     matchCriteriaId: "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*",
                     matchCriteriaId: "A2200AC8-A934-45FF-8C38-B4826CEB68E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*",
                     matchCriteriaId: "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0395450F-5486-425C-B6BE-549F2CE24C13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*",
                     matchCriteriaId: "EC948D61-A860-4E8E-975D-B19929AD27EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*",
                     matchCriteriaId: "1093F797-CF22-4E3D-8F54-3E8F3E7059F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*",
                     matchCriteriaId: "602F0B28-D553-4F29-BFCB-7F4A409E40F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "3202EBFB-B547-4BA2-8219-E00A86995D3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*",
                     matchCriteriaId: "4466C398-24F7-442F-9327-94E52B73FA7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A7F3423-7636-43DB-8C50-DB83A42D5CFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "05CE5511-6C01-4E19-A351-88B7A944531D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "80482643-A5E8-4585-BAD7-E30B40F2552E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*",
                     matchCriteriaId: "258A5FF1-C199-4775-9ACC-902D649E751E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*",
                     matchCriteriaId: "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*",
                     matchCriteriaId: "22591C38-3610-4910-ABE5-1574446F6650",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "4855870F-388F-4E72-A4F8-AAE61187A433",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "BD88A7B3-23BE-411E-9415-B47B5896FFD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E19E7943-2097-4C17-B344-948AB45CA308",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "45B1D735-DC16-4B1A-A21D-599E7F12651C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "F0004217-3B76-48B1-97F7-F0E548FBD6D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "392805F3-3B33-4E20-8108-6ED62DFE7480",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "AE4F139F-2003-453F-9D09-DBD4F2AEE31C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "418B65CF-9DB9-4A84-9872-4C87CC3DA76E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*",
                     matchCriteriaId: "CB86DA57-CE46-4651-84E1-409F2375A997",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*",
                     matchCriteriaId: "53A87A07-867B-48A9-BC89-47844EF461C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA8F24BA-849D-4C37-8094-EF2B6ABE4493",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F6C7373-073C-4F4E-859A-4EF82EF6FB72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DC7693A6-11AC-4BF9-9307-49D028F19885",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "0D435C18-BB4B-4023-8A52-49D44F1A7E9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1501370-BC00-4456-9A52-EE4E9899567A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*",
                     matchCriteriaId: "E585E98A-EB9A-492F-8902-85D99AC8E554",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*",
                     matchCriteriaId: "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*",
                     matchCriteriaId: "258BC823-5828-44B4-AFF5-A7E49281FD10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "DD7E734A-22C1-4895-AE1F-2EB87126EBA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*",
                     matchCriteriaId: "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:apache:poi:3.11:beta1:*:*:*:*:*:*",
                     matchCriteriaId: "9F89551C-19B6-4731-AB01-831B5B9C8C27",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.",
      },
      {
         lang: "es",
         value: "Apache POI anterior a 3.10.1 y 3.11.x anterior a 3.11-beta2 permite a atacantes remotos causar una denegación de servicio (consumo de CPU y caída) a través de un fichero OOXML manipulado, también conocido como un ataque de expansión de entidad XML (XEE).",
      },
   ],
   evaluatorComment: "<a href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>",
   id: "CVE-2014-3574",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-09-04T17:55:05.670",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://poi.apache.org/changes.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/59943",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/60419",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/61766",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/69648",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://poi.apache.org/changes.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1370.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1398.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1399.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2014-1400.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/59943",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/60419",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/61766",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/69648",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-10-23 20:15
Modified
2024-11-21 04:22
Summary
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
References
security@apache.orghttps://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E
security@apache.orghttps://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E
security@apache.orghttps://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E
security@apache.orghttps://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E
security@apache.orghttps://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
security@apache.orghttps://www.oracle.com//security-alerts/cpujul2021.htmlThird Party Advisory
security@apache.orghttps://www.oracle.com/security-alerts/cpuApr2021.htmlThird Party Advisory
security@apache.orghttps://www.oracle.com/security-alerts/cpuapr2020.htmlThird Party Advisory
security@apache.orghttps://www.oracle.com/security-alerts/cpujan2020.htmlThird Party Advisory
security@apache.orghttps://www.oracle.com/security-alerts/cpujan2021.htmlThird Party Advisory
security@apache.orghttps://www.oracle.com/security-alerts/cpujul2020.htmlThird Party Advisory
security@apache.orghttps://www.oracle.com/security-alerts/cpuoct2020.htmlThird Party Advisory
security@apache.orghttps://www.oracle.com/security-alerts/cpuoct2021.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com//security-alerts/cpujul2021.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuApr2021.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuapr2020.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2020.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujul2020.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2020.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2021.htmlThird Party Advisory
Impacted products
Vendor Product Version
apache poi *
oracle application_testing_suite 12.5.0.3
oracle application_testing_suite 13.1.0.1
oracle application_testing_suite 13.2.0.1
oracle application_testing_suite 13.3.0.1
oracle banking_enterprise_originations 2.7.0
oracle banking_enterprise_originations 2.8.0
oracle banking_enterprise_product_manufacturing 2.7.0
oracle banking_enterprise_product_manufacturing 2.8.0
oracle banking_payments 14.0.0
oracle banking_payments 14.1.0
oracle banking_platform 2.4.0
oracle banking_platform 2.4.1
oracle banking_platform 2.5.0
oracle banking_platform 2.6.0
oracle banking_platform 2.6.1
oracle banking_platform 2.6.2
oracle banking_platform 2.7.0
oracle banking_platform 2.7.1
oracle banking_platform 2.9.0
oracle big_data_discovery 1.6
oracle communications_diameter_signaling_router_idih\
oracle communications_diameter_signaling_router_idih\
oracle endeca_information_discovery_studio 3.2.0
oracle enterprise_manager_base_platform 12.1.0.5
oracle enterprise_manager_base_platform 13.3.0.0
oracle enterprise_manager_base_platform 13.4.0.0
oracle enterprise_repository 12.1.3.0.0
oracle financial_services_analytical_applications_infrastructure *
oracle financial_services_market_risk_measurement_and_management 8.0.6
oracle financial_services_market_risk_measurement_and_management 8.0.8
oracle flexcube_private_banking 12.0.0
oracle flexcube_private_banking 12.1.0
oracle hyperion_infrastructure_technology 11.1.2.4
oracle instantis_enterprisetrack 17.1
oracle instantis_enterprisetrack 17.2
oracle instantis_enterprisetrack 17.3
oracle insurance_policy_administration_j2ee 11.0.2
oracle insurance_policy_administration_j2ee 11.1.0
oracle insurance_policy_administration_j2ee 11.2.0
oracle insurance_rules_palette 10.2.0
oracle insurance_rules_palette 10.2.4
oracle insurance_rules_palette 11.0.2
oracle insurance_rules_palette 11.1.0
oracle insurance_rules_palette 11.2.0
oracle jdeveloper 12.2.1.4.0
oracle peoplesoft_enterprise_peopletools 8.57
oracle peoplesoft_enterprise_peopletools 8.58
oracle peoplesoft_enterprise_peopletools 8.59
oracle primavera_gateway 17.12.6
oracle primavera_gateway 18.8.8.1
oracle primavera_unifier *
oracle primavera_unifier 16.1
oracle primavera_unifier 16.2
oracle primavera_unifier 18.8
oracle primavera_unifier 19.12
oracle retail_clearance_optimization_engine 14.0
oracle retail_order_broker 15.0
oracle retail_order_broker 16.0
oracle retail_predictive_application_server 15.0.3
oracle retail_predictive_application_server 16.0.3
oracle webcenter_portal 12.2.1.3.0
oracle webcenter_portal 12.2.1.4.0
oracle webcenter_sites 12.2.1.3.0
oracle webcenter_sites 12.2.1.4.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D82A205-F4BE-4C18-A764-A2364B50BAD9",
                     versionEndIncluding: "4.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "17EA8B91-7634-4636-B647-1049BA7CA088",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B4DF46F-DBCC-41F2-A260-F83A14838F23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "10F17843-32EA-4C31-B65C-F424447BEF7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A125E817-F974-4509-872C-B71933F42AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_enterprise_originations:2.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AB8ABFD-C72C-4CBB-8872-9440A19154D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_enterprise_originations:2.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3054FEBB-484B-4927-9D1C-2024772E8B3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AED3C78-7D65-4F02-820D-B51BCE4022F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "557A23A1-4762-4D29-A478-D1670C1847D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_payments:14.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BE6EB99-98BF-49A2-8890-829320607A1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_payments:14.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD48BA85-B6D3-4BFD-9B48-755494FF094E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2BEE49E-A5AA-42D3-B422-460454505480",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4FF66F7-10C8-4A1C-910A-EF7D12A4284C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "35AD0C07-9688-4397-8D45-FBB88C0F0C11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8972497F-6E24-45A9-9A18-EB0E842CB1D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "400509A8-D6F2-432C-A2F1-AD5B8778D0D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "132CE62A-FBFC-4001-81EC-35D81F73AF48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "282150FF-C945-4A3E-8A80-E8757A8907EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "645AA3D1-C8B5-4CD2-8ACE-31541FA267F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9FC9AB-1070-420F-870E-A5EC43A924A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:big_data_discovery:1.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C4C38FF-B75B-4DF1-BFB3-C91BDD10D90E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::8.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2FDA4C6-68BA-4090-9645-A1A3C526F86C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::8.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "00F3F284-E638-495D-89D0-AEB0CCA969CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D03A8C9-35A5-4B75-9711-7A4A60457307",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "36E39918-B2D6-43F0-A607-8FD8BFF6F340",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7582B307-3899-4BBB-B868-BC912A4D0109",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_repository:12.1.3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9E13DD9-F456-4802-84AD-A2A1F12FE999",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40F940AA-05BE-426C-89A3-4098E107D9A7",
                     versionEndIncluding: "8.0.9",
                     versionStartIncluding: "8.0.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF6D5112-4055-4F89-A5B3-0DCB109481B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D262848E-AA24-4057-A747-6221BA22ADF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6762F207-93C7-4363-B2F9-7A7C6F8AF993",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B74B912-152D-4F38-9FC1-741D6D0B27FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DED59B62-C9BF-4C0E-B351-3884E8441655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F69B9A5-F21B-4904-9F27-95C0F7A628E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A570E5E-A3BC-4E19-BC44-C28D8BC9A537",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "991B23C1-83FA-40B1-AF0A-9A7B10A9EDA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D56B4193-4DB7-4BD9-85FF-8665601E6D4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEDF91E2-E7B5-40EE-B71F-C7D59F4021BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A94F93C-5828-4D78-9C48-20AC17E72B8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3E25293-CB03-44CE-A8ED-04B3A0487A6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F9721E3-EE25-4C8A-9E0A-E60D465E0A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:insurance_rules_palette:11.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E08D8FE6-2BB4-4FF6-8B42-2D47F6FBFDFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "335AB6A7-3B1F-4FA8-AF08-7D64C16C4B04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E1E416B-920B-49A0-9523-382898C2979D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8AF00C6-B97F-414D-A8DF-057E6BFD8597",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_gateway:17.12.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F5647E5-B051-41A6-B186-3584C725908B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_gateway:18.8.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A405B01-7DC5-41A0-9B61-C2DBE1C71A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FA59A8-6A62-4B33-8952-D6E658F8DAC9",
                     versionEndIncluding: "17.12",
                     versionStartIncluding: "17.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D55A54FD-7DD1-49CD-BE81-0BE73990943C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "82EB08C0-2D46-4635-88DF-E54F6452D3A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "202AD518-2E9B-4062-B063-9858AE1F9CE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "10864586-270E-4ACF-BDCC-ECFCD299305F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8109973-AE49-4E2C-B3A0-DDB18674C1FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE8CF045-09BB-4069-BCEC-496D5AE3B780",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "38E74E68-7F19-4EF3-AC00-3C249EAAA39E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "24A3C819-5151-4543-A5C6-998C9387C8A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FB98961-8C99-4490-A6B8-9A5158784F5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A4F71A-4269-40FC-8F61-1D1301F2B728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A502118-5B2B-47AE-82EC-1999BD841103",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D551CAB1-4312-44AA-BDA8-A030817E153A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "174A6D2E-E42E-4C92-A194-C6A820CD7EF4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.",
      },
      {
         lang: "es",
         value: "En Apache POI versiones hasta 4.1.0, cuando se utiliza la herramienta XSSFExportToXml para convertir documentos de Microsoft Excel proporcionados por el usuario, un documento especialmente diseñado puede permitir a un atacante leer archivos del sistema de archivos local o de los recursos de la red interna por medio de un Procesamiento de Entidad Externa XML (XXE).",
      },
   ],
   id: "CVE-2019-12415",
   lastModified: "2024-11-21T04:22:47.553",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-10-23T20:15:12.707",
   references: [
      {
         source: "security@apache.org",
         url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E",
      },
      {
         source: "security@apache.org",
         url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E",
      },
      {
         source: "security@apache.org",
         url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E",
      },
      {
         source: "security@apache.org",
         url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E",
      },
      {
         source: "security@apache.org",
         url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2020.html",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujul2020.html",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "security@apache.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujul2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "security@apache.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-611",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-03-24 14:59
Modified
2024-11-21 03:28
Summary
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Impacted products
Vendor Product Version
apache poi *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E6BF2C-539C-4F80-A5CE-1B6BB3B08F31",
                     versionEndIncluding: "3.14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.",
      },
      {
         lang: "es",
         value: "Apache POI en versiones anteriores al lanzamiento 3.15 permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) a través de un archivo OOXML especialmente manipulado, vulnerabilidad también conocida como un ataque de XML Entity Expansion (XEE).",
      },
   ],
   id: "CVE-2017-5644",
   lastModified: "2024-11-21T03:28:05.180",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-03-24T14:59:00.273",
   references: [
      {
         source: "security@apache.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15",
      },
      {
         source: "security@apache.org",
         url: "http://www.securityfocus.com/bid/96983",
      },
      {
         source: "security@apache.org",
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/96983",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
   ],
   sourceIdentifier: "security@apache.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-776",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-08-05 14:59
Modified
2025-04-12 10:46
Summary
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Impacted products
Vendor Product Version
apache poi *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A37C616-D64C-4067-91D5-0F288E4ABCEF",
                     versionEndIncluding: "3.13",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.",
      },
      {
         lang: "es",
         value: "El ejemplo XLSX2CSV en Apache POI en versiones anteriores a 3.14 permite a atacantes remotos leer archivos arbitrarios a través de un documento OpenXML manipulado que contiene una declaración de entidad externa en relación con una referencia a entidad, relacionado con un problema XML External Entity (XXE).",
      },
   ],
   id: "CVE-2016-5000",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-08-05T14:59:10.143",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/92100",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securitytracker.com/id/1037741",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.apache.org/list.html?user%40poi.apache.org",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21996759",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/538981/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/92100",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1037741",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/list.html?user%40poi.apache.org",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-611",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}