Súbít #616841: Jinhe OA V1.2 XML External Entity Referencebayani

KuraJinhe OA V1.2 XML External Entity Reference
GaskiyaDuring security testing of Jinhe OA system, a critical XXE injection vulnerability was discovered in the ProjectScheduleDelete.aspx endpoint. This vulnerability allows unauthenticated attackers to send specially crafted XML documents containing external entity references. The server processes these entities, enabling data exfiltration through out-of-band techniques.
Manga⚠️ https://github.com/cc2024k/CVE/issues/3
Màdùmga
 cc2024k (UID 87907)
Furta07/16/2025 07:26 (7 Wurɗi 전)
Gargajiya07/18/2025 19:43 (3 days later)
HalittaShingilam
VulDB gite316924 [Jinher OA 1.2 ProjectScheduleDelete.aspx XML External Entity]
Nganji18

Want to stay up to date on a daily basis?

Enable the mail alert feature now!