Start of main content
XML file processing as a cause of vulnerabilities
Tricky security vulnerabilities appear during XML file processing. How can a blog deployed on your machine cause a data leak? Why does an application start sending network requests while processing images?
During this talk, we'll inspect the connection between XML file processing and security vulnerabilities. We'll find out what XXE and XEE are, and how you can protect from them.