{"api_version":"1","generated_at":"2026-05-13T01:07:13+00:00","cve":"CVE-2016-2175","urls":{"html":"https://cve.report/CVE-2016-2175","api":"https://cve.report/api/cve/CVE-2016-2175.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-2175","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-2175"},"summary":{"title":"CVE-2016-2175","description":"Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.","state":"PUBLISHED","assigner":"redhat","published_at":"2016-06-01 20:59:01","updated_at":"2026-05-06 22:30:45"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"3.0","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"HIGH","vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://svn.apache.org/viewvc?view=revision&revision=1739565","name":"http://svn.apache.org/viewvc?view=revision&revision=1739565","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"[Apache-SVN] Revision 1739565","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://svn.apache.org/viewvc?view=revision&revision=1739564","name":"http://svn.apache.org/viewvc?view=revision&revision=1739564","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"[Apache-SVN] Revision 1739564","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54%40%3Ccommits.tika.apache.org%3E","name":"https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54%40%3Ccommits.tika.apache.org%3E","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2017-0248.html","name":"http://rhn.redhat.com/errata/RHSA-2017-0248.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/90902","name":"http://www.securityfocus.com/bid/90902","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Apache PDFBox CVE-2016-2175 XML External Entity Injection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://rhn.redhat.com/errata/RHSA-2017-0179.html","name":"http://rhn.redhat.com/errata/RHSA-2017-0179.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2017-0249.html","name":"http://rhn.redhat.com/errata/RHSA-2017-0249.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8%40apache.org%3E","name":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8%40apache.org%3E","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","mime":"text/xml","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2017-0272.html","name":"http://rhn.redhat.com/errata/RHSA-2017-0272.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/538503/100/0/threaded","name":"http://www.securityfocus.com/archive/1/538503/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2016/dsa-3606","name":"http://www.debian.org/security/2016/dsa-3606","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3606-1 libpdfbox-java","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html","name":"http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Apache PDFBox 1.8.11 / 2.0.0 / XML Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54@%3Ccommits.tika.apache.org%3E","name":"MLIST:[tika-commits] 20190802 svn commit: r1864259 [1/17] - in /tika/site: publish/ publish/1.10/ publish/1.11/ publish/1.12/ publish/1.13/ publish/1.14/ publish/1.15/ publish/1.16/ publish/1.17/ publish/1.18/ publish/1.19.1/ publish/1.19/ publish/1.20/ publish/1.21/ publish/1.22/ ...","refsource":"MITRE","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8@apache.org%3E","name":"MLIST:[www-announce] 20160527 [CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","refsource":"MITRE","tags":[],"title":"[CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-2175","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2175","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"1.8.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"2.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"2.0","cpe7":"rc2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"pdfbox","cpe6":"2.0","cpe7":"rc3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"2175","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2016-2175","qid":"981324","title":"Java (maven) Security Update for org.apache.pdfbox:pdfbox (GHSA-4c32-xmgj-2g98)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-05T23:17:50.579Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"RHSA-2017:0179","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2017-0179.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html"},{"name":"[www-announce] 20160527 [CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8%40apache.org%3E"},{"name":"DSA-3606","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2016/dsa-3606"},{"name":"20160527 [CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/538503/100/0/threaded"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://svn.apache.org/viewvc?view=revision&revision=1739564"},{"name":"90902","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/90902"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://svn.apache.org/viewvc?view=revision&revision=1739565"},{"name":"RHSA-2017:0272","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2017-0272.html"},{"name":"RHSA-2017:0248","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2017-0248.html"},{"name":"RHSA-2017:0249","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2017-0249.html"},{"name":"[tika-commits] 20190802 svn commit: r1864259 [1/17] - in /tika/site: publish/ publish/1.10/ publish/1.11/ publish/1.12/ publish/1.13/ publish/1.14/ publish/1.15/ publish/1.16/ publish/1.17/ publish/1.18/ publish/1.19.1/ publish/1.19/ publish/1.20/ publish/1.21/ publish/1.22/ ...","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54%40%3Ccommits.tika.apache.org%3E"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2016-05-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-08-02T19:06:06.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"RHSA-2017:0179","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2017-0179.html"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html"},{"name":"[www-announce] 20160527 [CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","tags":["mailing-list","x_refsource_MLIST"],"url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8%40apache.org%3E"},{"name":"DSA-3606","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2016/dsa-3606"},{"name":"20160527 [CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/538503/100/0/threaded"},{"tags":["x_refsource_CONFIRM"],"url":"http://svn.apache.org/viewvc?view=revision&revision=1739564"},{"name":"90902","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/90902"},{"tags":["x_refsource_CONFIRM"],"url":"http://svn.apache.org/viewvc?view=revision&revision=1739565"},{"name":"RHSA-2017:0272","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2017-0272.html"},{"name":"RHSA-2017:0248","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2017-0248.html"},{"name":"RHSA-2017:0249","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2017-0249.html"},{"name":"[tika-commits] 20190802 svn commit: r1864259 [1/17] - in /tika/site: publish/ publish/1.10/ publish/1.11/ publish/1.12/ publish/1.13/ publish/1.14/ publish/1.15/ publish/1.16/ publish/1.17/ publish/1.18/ publish/1.19.1/ publish/1.19/ publish/1.20/ publish/1.21/ publish/1.22/ ...","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54%40%3Ccommits.tika.apache.org%3E"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2016-2175","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"RHSA-2017:0179","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2017-0179.html"},{"name":"http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html"},{"name":"[www-announce] 20160527 [CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","refsource":"MLIST","url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8@apache.org%3E"},{"name":"DSA-3606","refsource":"DEBIAN","url":"http://www.debian.org/security/2016/dsa-3606"},{"name":"20160527 [CVE-2016-2175] Apache PDFBox XML External Entity vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/538503/100/0/threaded"},{"name":"http://svn.apache.org/viewvc?view=revision&revision=1739564","refsource":"CONFIRM","url":"http://svn.apache.org/viewvc?view=revision&revision=1739564"},{"name":"90902","refsource":"BID","url":"http://www.securityfocus.com/bid/90902"},{"name":"http://svn.apache.org/viewvc?view=revision&revision=1739565","refsource":"CONFIRM","url":"http://svn.apache.org/viewvc?view=revision&revision=1739565"},{"name":"RHSA-2017:0272","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2017-0272.html"},{"name":"RHSA-2017:0248","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2017-0248.html"},{"name":"RHSA-2017:0249","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2017-0249.html"},{"name":"[tika-commits] 20190802 svn commit: r1864259 [1/17] - in /tika/site: publish/ publish/1.10/ publish/1.11/ publish/1.12/ publish/1.13/ publish/1.14/ publish/1.15/ publish/1.16/ publish/1.17/ publish/1.18/ publish/1.19.1/ publish/1.19/ publish/1.20/ publish/1.21/ publish/1.22/ ...","refsource":"MLIST","url":"https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54@%3Ccommits.tika.apache.org%3E"}]}}}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2016-2175","datePublished":"2016-06-01T20:00:00.000Z","dateReserved":"2016-01-29T00:00:00.000Z","dateUpdated":"2024-08-05T23:17:50.579Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2016-06-01 20:59:01","lastModifiedDate":"2026-05-06 22:30:45","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.0:*:*:*:*:*:*:*","matchCriteriaId":"3F731F1D-75B3-4A8B-A54A-3E3E94774B4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.1:*:*:*:*:*:*:*","matchCriteriaId":"55675A83-9138-4052-AD50-FBAC6E230A93"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.2:*:*:*:*:*:*:*","matchCriteriaId":"B5051901-86CE-47DE-8485-C3504917423F"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.3:*:*:*:*:*:*:*","matchCriteriaId":"5EA1BD8B-00D6-4B7D-90D9-5B3AC08D22E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.4:*:*:*:*:*:*:*","matchCriteriaId":"F5DA1D34-E99F-400E-884F-05B9511669F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.5:*:*:*:*:*:*:*","matchCriteriaId":"B095DE26-F565-4EFF-AB4C-D6C3CC88BD6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.6:*:*:*:*:*:*:*","matchCriteriaId":"69E2D87A-3F68-41B0-B69A-90A124CD462C"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.7:*:*:*:*:*:*:*","matchCriteriaId":"192AF1D0-31CF-4F65-98DF-E1EB85BE622D"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.8:*:*:*:*:*:*:*","matchCriteriaId":"CE32BAA0-7B6C-4FAC-85CF-B2B5A56F8F56"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.9:*:*:*:*:*:*:*","matchCriteriaId":"E08AD210-90FB-40E2-9665-450B34EF6FB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.10:*:*:*:*:*:*:*","matchCriteriaId":"7B693709-1B83-4B23-AD54-B002F4ACD4A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:1.8.11:*:*:*:*:*:*:*","matchCriteriaId":"E4E1DA3F-E8F8-4424-B224-B2B9A2A93747"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:2.0:*:*:*:*:*:*:*","matchCriteriaId":"1EBD8054-1545-4A7E-8EE9-36632846FF11"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:2.0:rc1:*:*:*:*:*:*","matchCriteriaId":"1E3BD109-5505-45BC-A48D-CDF7D190E4B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:2.0:rc2:*:*:*:*:*:*","matchCriteriaId":"A3D6D027-1F55-413D-8F7F-7D94C2C2B917"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pdfbox:2.0:rc3:*:*:*:*:*:*","matchCriteriaId":"093E23C1-668C-4EBD-ADA8-C61F46BD3CC3"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"2175","Ordinal":"1","Title":"CVE-2016-2175","CVE":"CVE-2016-2175","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"2175","Ordinal":"1","NoteData":"Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.","Type":"Description","Title":"CVE-2016-2175"},{"CveYear":"2016","CveId":"2175","Ordinal":"2","NoteData":"2016-06-01","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"2175","Ordinal":"3","NoteData":"2019-08-02","Type":"Other","Title":"Modified"}]}}}