Home / Vulnerability Database / C-sharp : XML without validation
C#
C-sharp : XML without validation
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
CWE
Overview
The application does not validate the XML file. An attacker can submit malicious or malformed file.
Injection attacks take the first place in the “OWASP Top 10 2017” web application vulnerabilities ranking and the seventh place in the “OWASP Mobile Top 10 2014” ranking. The level of potential damage from such an attack depends on the user input validation performance and file protection mechanisms.
MEDIUM
DerScanner Severity Score
Do you want to fix C-sharp : XML without validation in your application?
See also
C#
C-sharp : JWT: None Algorithm
C#
C-sharp : Insecure data transmission: Database
C#
