CVE-2014-3004
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0363 (3.6%)
Percentil: 87.9%
EPSS: 2026-05-06
Afecta
castor_project:castoropensuse:opensuseopensuse_project:opensuseDescripción técnica
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
Publicada: 11/6/2014, 14:55:07
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00043.html
- http://packetstormsecurity.com/files/126854/Castor-Library-XXE-Disclosure.html
- http://seclists.org/fulldisclosure/2014/May/142
- http://secunia.com/advisories/59427
- http://www.securityfocus.com/bid/67676
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html