Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2020-10683 is a critical severity vulnerability with a CVSS score of 9.8. No known exploits currently, and patches are available.
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.
Lower probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
Note: This advisory applies to dom4j:dom4j version 1.x legacy artifacts. To resolve this a change to the latest version of org.dom4j:dom4j is recommended.
| Vendor | Product |
|---|---|
| Oracle | Utilities Framework |
| Oracle | Insurance Policy Administration J2ee |
| Dom4j Project | Dom4j |
| Oracle | Retail Customer Management And Segmentation Foundation |
| Oracle | Endeca Information Discovery Integrator |
| Oracle | Retail Order Broker |
| Oracle | Health Sciences Empirica Signal |
| Oracle | Enterprise Manager Base Platform |
| Oracle | Flexcube Core Banking |
| Oracle | Communications Application Session Controller |
And 28 more...