Home / Vulnerability Database / C-sharp : XML without validation
C#

C-sharp : XML without validation

Classification

Overview

The application does not validate the XML file. An attacker can submit malicious or malformed file.

Injection attacks take the first place in the “OWASP Top 10 2017” web application vulnerabilities ranking and the seventh place in the “OWASP Mobile Top 10 2014” ranking. The level of potential damage from such an attack depends on the user input validation performance and file protection mechanisms.

MEDIUM

DerScanner Severity Score

Do you want to fix C-sharp : XML without validation in your application?

See also

C#

C-sharp : JWT: None Algorithm

C#

C-sharp : Insecure data transmission: Database

C#

C-sharp : Only one of method Equals() and GetHashCode() defined