This is my take on XML External Entities and how a feature of this front-end language intrigued the security researchers and how it was proved to be a vulnerability if XML is not implemented properly.
The process to analyze or understand any vulnerability:
1. What it is?
2. Why does…