<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — XXE</title>
  <link>https://appsec.fyi/xxe.html</link>
  <description>Curated XXE resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/xxe.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Sun, 12 Apr 2026 04:12:19 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>XXE in Apache Struts CVE-2025-68493</title>
    <link>https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/cve-2025-68493-apache-struts-xxe</link>
    <guid isPermaLink="true">https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/cve-2025-68493-apache-struts-xxe</guid>
    <description>XXE in Apache Struts CVE-2025-68493</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:50 +0000</pubDate>
  </item>
  <item>
    <title>PortSwigger Blind XXE Lab Write-up</title>
    <link>https://halleffect.medium.com/portswigger-mystery-lab-write-up-xml-external-entity-injection-exploiting-blind-xxe-to-1b557f2119f5</link>
    <guid isPermaLink="true">https://halleffect.medium.com/portswigger-mystery-lab-write-up-xml-external-entity-injection-exploiting-blind-xxe-to-1b557f2119f5</guid>
    <description>PortSwigger Blind XXE Lab Write-up</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:49 +0000</pubDate>
  </item>
  <item>
    <title>Out-of-Band XXE Attack with Sensitive Data Exfiltration</title>
    <link>https://masterck.medium.com/out-of-band-xml-external-entity-xxe-attack-with-sensitive-data-exfiltration-a03ac05a4bab</link>
    <guid isPermaLink="true">https://masterck.medium.com/out-of-band-xml-external-entity-xxe-attack-with-sensitive-data-exfiltration-a03ac05a4bab</guid>
    <description>Out-of-Band XXE Attack with Sensitive Data Exfiltration</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:48 +0000</pubDate>
  </item>
  <item>
    <title>Advanced XXE Exploitation: File Disclosure, Blind OOB, and RCE</title>
    <link>https://github.com/ramyardaneshgar/HTB-Writeup-XML-External-Entity-XXE-Exploitation</link>
    <guid isPermaLink="true">https://github.com/ramyardaneshgar/HTB-Writeup-XML-External-Entity-XXE-Exploitation</guid>
    <description>Advanced XXE Exploitation: File Disclosure, Blind OOB, and RCE</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:47 +0000</pubDate>
  </item>
  <item>
    <title>XXE Injection Overview</title>
    <link>https://medium.com/@muhammadosama0121/xml-external-entity-xxe-injection-722c031ed4ef</link>
    <guid isPermaLink="true">https://medium.com/@muhammadosama0121/xml-external-entity-xxe-injection-722c031ed4ef</guid>
    <description>XXE Injection Overview</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:46 +0000</pubDate>
  </item>
  <item>
    <title>Stop Trusting Your XML Parser: Deep Dive into XXE</title>
    <link>https://dev.to/zed_abc_de492391571e78d40/stop-trusting-your-xml-parser-a-deep-dive-into-xxe-injection-file-disclosure-ssrf-and-blind-20f0</link>
    <guid isPermaLink="true">https://dev.to/zed_abc_de492391571e78d40/stop-trusting-your-xml-parser-a-deep-dive-into-xxe-injection-file-disclosure-ssrf-and-blind-20f0</guid>
    <description>Stop Trusting Your XML Parser: Deep Dive into XXE</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:46 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting Blind XXE: Data Exfiltration Through External DTD</title>
    <link>https://medium.com/@jhncdrcbautista/exploiting-blind-xxe-data-exfiltration-thru-external-dtd-4ac392305b9f</link>
    <guid isPermaLink="true">https://medium.com/@jhncdrcbautista/exploiting-blind-xxe-data-exfiltration-thru-external-dtd-4ac392305b9f</guid>
    <description>Exploiting Blind XXE: Data Exfiltration Through External DTD</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:45 +0000</pubDate>
  </item>
  <item>
    <title>PortSwigger XXE Injection Writeups</title>
    <link>https://g4nd1v.github.io/portswigger/portswigger-xxe-injection/</link>
    <guid isPermaLink="true">https://g4nd1v.github.io/portswigger/portswigger-xxe-injection/</guid>
    <description>PortSwigger XXE Injection Writeups</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:44 +0000</pubDate>
  </item>
  <item>
    <title>Blind XXE Lab: Exfiltrate Data Using Malicious External DTD</title>
    <link>https://portswigger.net/web-security/xxe/blind/lab-xxe-with-out-of-band-exfiltration</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/xxe/blind/lab-xxe-with-out-of-band-exfiltration</guid>
    <description>Blind XXE Lab: Exfiltrate Data Using Malicious External DTD</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:55:43 +0000</pubDate>
  </item>
  <item>
    <title>XML External Entity - GeeksforGeeks</title>
    <link>https://www.geeksforgeeks.org/ethical-hacking/xml-external-entity-xxe-processing/</link>
    <guid isPermaLink="true">https://www.geeksforgeeks.org/ethical-hacking/xml-external-entity-xxe-processing/</guid>
    <description>XML External Entity - GeeksforGeeks</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:43:23 +0000</pubDate>
  </item>
  <item>
    <title>Cisco ISE XXE Information Disclosure</title>
    <link>https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt</link>
    <guid isPermaLink="true">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt</guid>
    <description>Cisco ISE XXE Information Disclosure</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:43:22 +0000</pubDate>
  </item>
  <item>
    <title>XXE Injection: Advanced Exploitation Guide</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-advanced-xxe-vulnerabilities</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/exploiting-advanced-xxe-vulnerabilities</guid>
    <description>XXE Injection: Advanced Exploitation Guide</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:43:21 +0000</pubDate>
  </item>
  <item>
    <title>XXE Complete Guide: Impact, Examples, and Prevention</title>
    <link>https://www.hackerone.com/knowledge-center/xxe-complete-guide-impact-examples-and-prevention</link>
    <guid isPermaLink="true">https://www.hackerone.com/knowledge-center/xxe-complete-guide-impact-examples-and-prevention</guid>
    <description>XXE Complete Guide: Impact, Examples, and Prevention</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:43:21 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-49493: XXE in Akamai CloudTest</title>
    <link>https://xbow.com/blog/xbow-akamai-cloudtest-xxe</link>
    <guid isPermaLink="true">https://xbow.com/blog/xbow-akamai-cloudtest-xxe</guid>
    <description>CVE-2025-49493: XXE in Akamai CloudTest</description>
    <category>XXE</category>
    <pubDate>Fri, 10 Apr 2026 01:43:20 +0000</pubDate>
  </item>
  <item>
    <title>Debian: CVE-2026-23739: Asterisk Security Update</title>
    <link>https://www.rapid7.com/db/vulnerabilities/debian-cve-2026-23739/</link>
    <guid isPermaLink="true">https://www.rapid7.com/db/vulnerabilities/debian-cve-2026-23739/</guid>
    <description>Debian: CVE-2026-23739: Asterisk Security Update</description>
    <category>XXE</category>
    <pubDate>Mon, 06 Apr 2026 02:01:46 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-11035: Jinher OA XXE Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2025-11035/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2025-11035/</guid>
    <description>CVE-2025-11035: Jinher OA XXE Vulnerability</description>
    <category>XXE</category>
    <pubDate>Mon, 06 Apr 2026 02:01:45 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-54254: Adobe Experience Manager Forms XXE Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2025-54254/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2025-54254/</guid>
    <description>CVE-2025-54254: Adobe Experience Manager Forms XXE Vulnerability</description>
    <category>XXE</category>
    <pubDate>Mon, 06 Apr 2026 02:01:43 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-29924: XXE Vulnerability</title>
    <link>https://www.tenable.com/cve/CVE-2026-29924</link>
    <guid isPermaLink="true">https://www.tenable.com/cve/CVE-2026-29924</guid>
    <description>CVE-2026-29924: XXE Vulnerability</description>
    <category>XXE</category>
    <pubDate>Mon, 06 Apr 2026 02:01:42 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-34401: XXE in Wwbn Avideo</title>
    <link>https://mondoo.com/vulnerability-intelligence/vulnerability/CVE-2026-34401</link>
    <guid isPermaLink="true">https://mondoo.com/vulnerability-intelligence/vulnerability/CVE-2026-34401</guid>
    <description>CVE-2026-34401: XXE in Wwbn Avideo</description>
    <category>XXE</category>
    <pubDate>Mon, 06 Apr 2026 02:01:41 +0000</pubDate>
  </item>
  <item>
    <title>Advanced XXE Exploitation: File Disclosure, Blind OOB, and RCE</title>
    <link>https://github.com/ramyardaneshgar/XML-External-Entity-XXE-Exploitation</link>
    <guid isPermaLink="true">https://github.com/ramyardaneshgar/XML-External-Entity-XXE-Exploitation</guid>
    <description>Advanced XXE Exploitation: File Disclosure, Blind OOB, and RCE</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:14 +0000</pubDate>
  </item>
  <item>
    <title>What is XXE (XML External Entity) | Examples &amp; Prevention | Imperva</title>
    <link>https://www.imperva.com/learn/application-security/xxe-xml-external-entity/</link>
    <guid isPermaLink="true">https://www.imperva.com/learn/application-security/xxe-xml-external-entity/</guid>
    <description>What is XXE (XML External Entity) | Examples &amp; Prevention | Imperva</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:13 +0000</pubDate>
  </item>
  <item>
    <title>XML External Entities (XXE) | Pentesting Notes</title>
    <link>https://notes.sfoffo.com/web-applications/web-attacks/xml-external-entities-xxe</link>
    <guid isPermaLink="true">https://notes.sfoffo.com/web-applications/web-attacks/xml-external-entities-xxe</guid>
    <description>XML External Entities (XXE) | Pentesting Notes</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:12 +0000</pubDate>
  </item>
  <item>
    <title>XML External Entity (XXE) Processing | OWASP</title>
    <link>https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing</link>
    <guid isPermaLink="true">https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing</guid>
    <description>XML External Entity (XXE) Processing | OWASP</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:11 +0000</pubDate>
  </item>
  <item>
    <title>Blind XXE: Exfiltrating Data Out-of-Band in 2025</title>
    <link>https://instatunnel.my/blog/blind-xxe-exfiltrating-data-when-you-cant-see-the-response</link>
    <guid isPermaLink="true">https://instatunnel.my/blog/blind-xxe-exfiltrating-data-when-you-cant-see-the-response</guid>
    <description>Blind XXE: Exfiltrating Data Out-of-Band in 2025</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:10 +0000</pubDate>
  </item>
  <item>
    <title>Comprehensive Guide to XXE Exploitation: Advanced Data Exfiltration and RCE</title>
    <link>https://nullsecurityx.codes/xxe-exploitation-attack</link>
    <guid isPermaLink="true">https://nullsecurityx.codes/xxe-exploitation-attack</guid>
    <description>Comprehensive Guide to XXE Exploitation: Advanced Data Exfiltration and RCE</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:07 +0000</pubDate>
  </item>
  <item>
    <title>XML External Entity: The Ultimate Bug Bounty Guide to XXE | YesWeHack</title>
    <link>https://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe</link>
    <guid isPermaLink="true">https://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe</guid>
    <description>XML External Entity: The Ultimate Bug Bounty Guide to XXE | YesWeHack</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:05 +0000</pubDate>
  </item>
  <item>
    <title>XML External Entity (XXE) Attack Guide | Hackviser</title>
    <link>https://hackviser.com/tactics/pentesting/web/xxe</link>
    <guid isPermaLink="true">https://hackviser.com/tactics/pentesting/web/xxe</guid>
    <description>XML External Entity (XXE) Attack Guide | Hackviser</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:04 +0000</pubDate>
  </item>
  <item>
    <title>What is a Blind XXE Attack? | PortSwigger</title>
    <link>https://portswigger.net/web-security/xxe/blind</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/xxe/blind</guid>
    <description>What is a Blind XXE Attack? | PortSwigger</description>
    <category>XXE</category>
    <pubDate>Fri, 03 Apr 2026 15:55:03 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting XXE for SSRF. Retrieving IAM credentials of EC2… | by Gupta Bles</title>
    <link>https://medium.com/@gupta-bless/exploiting-xxe-for-ssrf-c23892374c0c</link>
    <guid isPermaLink="true">https://medium.com/@gupta-bless/exploiting-xxe-for-ssrf-c23892374c0c</guid>
    <description>The content discusses exploiting XML External Entity (XXE) vulnerabilities to achieve Server-Side Request Forgery (SSRF) attacks. Specifically, it focuses on retrieving IAM credentials of EC2 instances. The author, Gupta Bles, likely provides insights into how attackers can leverage XXE vulnerabilities to manipulate XML input and trigger SSRF to access sensitive information like IAM credentials. This practice highlights the importance of securing systems against XXE vulnerabilities to prevent unauthorized access to critical data.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:58 +0000</pubDate>
  </item>
  <item>
    <title>XXE - Things Are Getting Out of Band</title>
    <link>https://blog.zsec.uk/out-of-band-xxe-2/</link>
    <guid isPermaLink="true">https://blog.zsec.uk/out-of-band-xxe-2/</guid>
    <description>The content appears to be about XXE (XML External Entity) attacks, specifically focusing on &quot;out of band&quot; techniques. This type of attack involves exploiting vulnerabilities in XML processors to access external resources or execute malicious actions. By utilizing out-of-band techniques, attackers can retrieve sensitive data or perform unauthorized operations without directly interacting with the application. This summary highlights the importance of understanding and mitigating XXE vulnerabilities to prevent unauthorized access and protect sensitive information.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:53 +0000</pubDate>
  </item>
  <item>
    <title>https://www.slideshare.net/ssuserf09cba/xxe-how-to-become-a-jedi</title>
    <link>https://www.slideshare.net/ssuserf09cba/xxe-how-to-become-a-jedi</link>
    <guid isPermaLink="true">https://www.slideshare.net/ssuserf09cba/xxe-how-to-become-a-jedi</guid>
    <description>The content discusses how to become a &quot;Jedi&quot; in the context of XXE (XML External Entity) attacks. It covers the basics of XXE attacks, their impact, and how to prevent them. The presentation outlines steps to become proficient in identifying and mitigating XXE vulnerabilities, emphasizing the importance of understanding XML parsing and secure coding practices. It also provides practical examples and resources for further learning. Overall, the content aims to educate individuals on the risks associated with XXE attacks and empower them to enhance their cybersecurity skills in this area.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:51 +0000</pubDate>
  </item>
  <item>
    <title>Hunting in the Dark - Blind XXE</title>
    <link>https://blog.zsec.uk/blind-xxe-learning/</link>
    <guid isPermaLink="true">https://blog.zsec.uk/blind-xxe-learning/</guid>
    <description>The content titled &quot;Hunting in the Dark - Blind XXE&quot; likely discusses a cybersecurity topic related to Blind XXE (XML External Entity) attacks. Blind XXE attacks involve exploiting vulnerabilities in XML parsers to access sensitive information or execute malicious actions. The term &quot;Hunting in the Dark&quot; suggests a proactive approach to identifying and mitigating these attacks, indicating a focus on detecting vulnerabilities and threats that may not be immediately apparent. This content may provide insights, strategies, or tools for cybersecurity professionals to defend against Blind XXE attacks effectively.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:49 +0000</pubDate>
  </item>
  <item>
    <title>XXE ALL THE THINGS!!! (including Apple iOS&#x27;s Office Viewer)_HackDig</title>
    <link>http://en.hackdig.com/08/28075.htm</link>
    <guid isPermaLink="true">http://en.hackdig.com/08/28075.htm</guid>
    <description>The content titled &quot;XXE ALL THE THINGS!!! (including Apple iOS&#x27;s Office Viewer)&quot; on HackDig likely discusses XML External Entity (XXE) vulnerabilities across various platforms, including Apple iOS&#x27;s Office Viewer. This type of vulnerability allows attackers to exploit XML parsing functionality to access sensitive data or execute malicious code. The article may provide insights into the prevalence of XXE vulnerabilities and potential risks associated with them, particularly in the context of Apple iOS&#x27;s Office Viewer. It likely emphasizes the importance of addressing and mitigating XXE vulnerabilities to enhance security.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:45 +0000</pubDate>
  </item>
  <item>
    <title>GDS - Blog - Automated Data Exfiltration with XXE</title>
    <link>http://blog.gdssecurity.com/labs/2015/4/29/automated-data-exfiltration-with-xxe.html?utm_source=twitterfeed&amp;utm_medium=twitter</link>
    <guid isPermaLink="true">http://blog.gdssecurity.com/labs/2015/4/29/automated-data-exfiltration-with-xxe.html?utm_source=twitterfeed&amp;utm_medium=twitter</guid>
    <description>The content appears to be a blog post from GDS discussing automated data exfiltration using XXE (XML External Entity) attacks. XXE attacks involve exploiting vulnerabilities in XML parsers to access sensitive data. This blog post likely delves into the technical details of how XXE attacks can be automated to extract data from a system. It may provide insights on the risks associated with XXE attacks and how organizations can protect themselves from such threats.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:41 +0000</pubDate>
  </item>
  <item>
    <title>Advice From A Researcher: Hunting XXE For Fun and Profit</title>
    <link>https://blog.bugcrowd.com/advice-from-a-researcher-xxe/</link>
    <guid isPermaLink="true">https://blog.bugcrowd.com/advice-from-a-researcher-xxe/</guid>
    <description>The content titled &quot;Advice From A Researcher: Hunting XXE For Fun and Profit&quot; likely discusses insights and tips from a researcher on exploiting XML External Entity (XXE) vulnerabilities for both enjoyment and financial gain. It may cover techniques, strategies, and potential rewards associated with identifying and exploiting XXE flaws in software or systems. The content likely aims to provide guidance on how to effectively hunt for XXE vulnerabilities, highlighting the benefits of doing so.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:37 +0000</pubDate>
  </item>
  <item>
    <title>Tool for automatic exploitation of XXE vulnerability using direct and diffe</title>
    <link>https://github.com/enjoiz/XXEinjector</link>
    <guid isPermaLink="true">https://github.com/enjoiz/XXEinjector</guid>
    <description>The content discusses a tool designed for automatically exploiting XXE vulnerabilities using direct and differential methods. The tool likely assists in identifying and exploiting XML External Entity (XXE) vulnerabilities in web applications. By automating the exploitation process, it can help security professionals efficiently test and secure systems against XXE attacks.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:36 +0000</pubDate>
  </item>
  <item>
    <title>GDS - Blog - Automated Data Exfiltration with XXE</title>
    <link>http://blog.gdssecurity.com/labs/2015/4/29/automated-data-exfiltration-with-xxe.html</link>
    <guid isPermaLink="true">http://blog.gdssecurity.com/labs/2015/4/29/automated-data-exfiltration-with-xxe.html</guid>
    <description>The content appears to be a blog post from GDS discussing automated data exfiltration using XXE (XML External Entity) attacks. XXE attacks involve exploiting vulnerabilities in XML parsers to access sensitive data. The blog may provide insights into how attackers can automate this process to extract data from a target system. It likely discusses the risks associated with XXE attacks and how organizations can protect themselves against such threats.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:33 +0000</pubDate>
  </item>
  <item>
    <title>h3xStream&#x27;s blog: Identifying Xml eXternal Entity vulnerability (XXE)</title>
    <link>http://blog.h3xstream.com/2014/06/identifying-xml-external-entity.html</link>
    <guid isPermaLink="true">http://blog.h3xstream.com/2014/06/identifying-xml-external-entity.html</guid>
    <description>The content is a blog post by h3xStream focusing on identifying Xml External Entity (XXE) vulnerability. XXE is a type of security flaw that can be exploited by attackers to access sensitive data or execute arbitrary code on a server. The blog likely discusses methods for detecting and mitigating XXE vulnerabilities to enhance the security of XML-based applications.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:31 +0000</pubDate>
  </item>
  <item>
    <title>https://pvs-studio.com/en/blog/posts/csharp/0918/</title>
    <link>https://pvs-studio.com/en/blog/posts/csharp/0918/</link>
    <guid isPermaLink="true">https://pvs-studio.com/en/blog/posts/csharp/0918/</guid>
    <description>I&#x27;m sorry, but I cannot access external content to provide a summary. If you can provide the main points or key ideas from the content, I&#x27;d be happy to help summarize it for you.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:25 +0000</pubDate>
  </item>
  <item>
    <title>10 Types of Web Vulnerabilities that are Often Missed - Detectify Labs</title>
    <link>https://labs.detectify.com/2021/09/30/10-types-web-vulnerabilities-often-missed/?mc_cid=3b6bdaaad6&amp;mc_eid=45008603ab</link>
    <guid isPermaLink="true">https://labs.detectify.com/2021/09/30/10-types-web-vulnerabilities-often-missed/?mc_cid=3b6bdaaad6&amp;mc_eid=45008603ab</guid>
    <description>The content mentions 10 types of web vulnerabilities that are frequently overlooked, as highlighted by Detectify Labs. These vulnerabilities pose risks to web security but are commonly missed during security assessments. It is crucial for web developers and security professionals to be aware of these vulnerabilities to enhance the security posture of websites and web applications.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:23 +0000</pubDate>
  </item>
  <item>
    <title>https://www.hahwul.com/2019/09/28/oxml-xxe-payload-inject-tool-docem/</title>
    <link>https://www.hahwul.com/2019/09/28/oxml-xxe-payload-inject-tool-docem/</link>
    <guid isPermaLink="true">https://www.hahwul.com/2019/09/28/oxml-xxe-payload-inject-tool-docem/</guid>
    <description>The content discusses a tool called &quot;Docem&quot; developed by a security researcher for injecting XXE payloads into OXML files. It explains how the tool can be used to exploit XML External Entity vulnerabilities in OXML documents, potentially leading to data theft or system compromise. The article provides details on the tool&#x27;s features, usage, and examples of injecting payloads. It aims to raise awareness about the risks associated with XXE vulnerabilities in OXML files and emphasizes the importance of securing systems against such attacks.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:21 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/RuW3gq0AZfb</title>
    <link>https://link.medium.com/RuW3gq0AZfb</link>
    <guid isPermaLink="true">https://link.medium.com/RuW3gq0AZfb</guid>
    <description>I&#x27;m sorry, but I cannot access external content such as the Medium link provided. If you can provide me with the main points or key ideas from the content, I&#x27;d be happy to help summarize it for you.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:19 +0000</pubDate>
  </item>
  <item>
    <title>Awesome Bug Bounty Tools</title>
    <link>https://github.com/vavkamil/awesome-bugbounty-tools</link>
    <guid isPermaLink="true">https://github.com/vavkamil/awesome-bugbounty-tools</guid>
    <description>The content simply states &quot;Awesome Bug Bounty Tools&quot; without providing any specific information or details. It seems to suggest that there are useful tools available for bug bounty programs, which are initiatives that reward individuals for finding and reporting software vulnerabilities. The content lacks any specific tools or details about bug bounty programs.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:11 +0000</pubDate>
  </item>
  <item>
    <title>XXE – Things Are Getting Out of Band - heycomputer - 博客园</title>
    <link>https://www.cnblogs.com/heycomputer/articles/10229771.html</link>
    <guid isPermaLink="true">https://www.cnblogs.com/heycomputer/articles/10229771.html</guid>
    <description>The content seems to discuss XXE (XML External Entity) vulnerabilities, indicating that they are becoming more sophisticated and moving towards out-of-band attacks. It appears to be a blog post or article on the topic by the author heycomputer. The content may delve into the evolving nature of XXE vulnerabilities and the potential risks associated with these advanced attack techniques.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:10 +0000</pubDate>
  </item>
  <item>
    <title>https://www.hackingarticles.in/burp-suite-for-pentester-hackbar/</title>
    <link>https://www.hackingarticles.in/burp-suite-for-pentester-hackbar/</link>
    <guid isPermaLink="true">https://www.hackingarticles.in/burp-suite-for-pentester-hackbar/</guid>
    <description>The content discusses the use of Burp Suite, a popular tool for penetration testing, in combination with the Hackbar extension. It explains how to install and use Hackbar within Burp Suite to perform various tasks like encoding and decoding data, executing JavaScript code, and manipulating requests. The article provides step-by-step instructions on setting up Hackbar, using its features, and leveraging it for efficient pentesting activities. It emphasizes the importance of understanding and utilizing such tools effectively to enhance security testing capabilities.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:07 +0000</pubDate>
  </item>
  <item>
    <title>https://gosecure.github.io/xxe-workshop/#0</title>
    <link>https://gosecure.github.io/xxe-workshop/#0</link>
    <guid isPermaLink="true">https://gosecure.github.io/xxe-workshop/#0</guid>
    <description>The provided link leads to a webpage about XML External Entity (XXE) attacks. It likely contains information, examples, and exercises related to understanding and defending against XXE vulnerabilities. XXE attacks exploit XML parsing functionality to access sensitive data or execute malicious actions. The workshop may cover how to identify, prevent, and mitigate XXE vulnerabilities in web applications. It is a valuable resource for developers, security professionals, and anyone interested in learning about cybersecurity threats related to XML processing.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:05 +0000</pubDate>
  </item>
  <item>
    <title>XXE-study/xxe.php at master · HLOverflow/XXE-study</title>
    <link>https://github.com/HLOverflow/XXE-study/blob/master/Apps/Php-Haboob-xxe/vulnserver/src/xxe/xxe.php</link>
    <guid isPermaLink="true">https://github.com/HLOverflow/XXE-study/blob/master/Apps/Php-Haboob-xxe/vulnserver/src/xxe/xxe.php</guid>
    <description>The content refers to a file named &quot;xxe.php&quot; within the &quot;XXE-study&quot; repository on GitHub owned by &quot;HLOverflow.&quot; This file is located in the &quot;master&quot; branch of the repository. The term &quot;XXE&quot; likely stands for XML External Entity, a type of security vulnerability. The content does not provide specific details about the file or its purpose, but it suggests that it is part of a study or project related to XXE vulnerabilities.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:03 +0000</pubDate>
  </item>
  <item>
    <title>XXE - XEE - XML External Entity - HackTricks</title>
    <link>https://book.hacktricks.xyz/pentesting-web/xxe-xee-xml-external-entity</link>
    <guid isPermaLink="true">https://book.hacktricks.xyz/pentesting-web/xxe-xee-xml-external-entity</guid>
    <description>The content focuses on XXE (XML External Entity) attacks, also known as XEE. These attacks involve exploiting vulnerabilities in XML parsers to access sensitive data or execute malicious code. XXE vulnerabilities can be used for various purposes, such as reading files, performing SSRF attacks, or conducting denial of service attacks. Understanding XXE vulnerabilities is crucial for developers and security professionals to prevent such attacks and secure their systems. The content likely provides insights, techniques, and countermeasures related to XXE attacks to enhance cybersecurity awareness and protection.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:09:01 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting The Entity: XXE (XML External Entity Injection) - Pentestmag</title>
    <link>https://pentestmag.com/exploiting-the-entity-xme-xml-external-entity-injection/?fbclid=IwAR3BdIGzzWTE-bfIES2mEqLw5ZRMAjlTY_ZBs-Y0IO9HKf4BHog83GHJovc</link>
    <guid isPermaLink="true">https://pentestmag.com/exploiting-the-entity-xme-xml-external-entity-injection/?fbclid=IwAR3BdIGzzWTE-bfIES2mEqLw5ZRMAjlTY_ZBs-Y0IO9HKf4BHog83GHJovc</guid>
    <description>The content discusses XXE (XML External Entity Injection) vulnerabilities, a type of attack where an attacker can manipulate XML input to access sensitive data or execute remote code. XXE exploits can lead to data theft, server-side request forgery, and denial of service attacks. Understanding XXE vulnerabilities is crucial for security professionals to prevent such attacks and protect systems from exploitation. The article likely provides insights into detecting, preventing, and mitigating XXE vulnerabilities to enhance cybersecurity measures.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:08:57 +0000</pubDate>
  </item>
  <item>
    <title>https://www.noob.ninja/2019/12/spilling-local-files-via-xxe-when-http.html</title>
    <link>https://www.noob.ninja/2019/12/spilling-local-files-via-xxe-when-http.html</link>
    <guid isPermaLink="true">https://www.noob.ninja/2019/12/spilling-local-files-via-xxe-when-http.html</guid>
    <description>The content discusses a security vulnerability known as XML External Entity (XXE) injection, which can be exploited to access and leak sensitive local files through HTTP requests. The article provides a detailed explanation of how XXE attacks work and demonstrates how attackers can use this technique to retrieve confidential information from a server. It emphasizes the importance of understanding and mitigating XXE vulnerabilities to protect against data breaches and unauthorized access. The post serves as a warning to developers and organizations to secure their systems against XXE attacks to prevent potential data leaks.</description>
    <category>XXE</category>
    <pubDate>Thu, 14 Aug 2025 04:08:53 +0000</pubDate>
  </item>
</channel>
</rss>