Select Reports > Portal > Repository > Standard Content > OWASP > A 4 - XML External Entities.
Older or mis-configured XML processors use XML documents to evaluate external entity references, and can inadvertently process harmful XML input. Malicious users the XML processor’s to reveal internal content such as files, file shares, and port scans, as well as execute remote code and denial-of-service attacks.
To watch for XML external entity attacks, use the following report and dashboard.
Lists the hosts with the most XML vulnerabilities.
Provides charts and a table to help you identify the systems with the most XML vulnerabilities as well as the most reported vulnerabilities. You can review the vulnerabilities by severity and risk indicator.