CVE-2021-37578
- EPSS 1.58%
- Veröffentlicht 29.07.2021 07:15:06
- Zuletzt bearbeitet 21.11.2024 06:15:27
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RM...
CVE-2009-4267
- EPSS 0.21%
- Veröffentlicht 19.02.2018 16:29:00
- Zuletzt bearbeitet 21.11.2024 01:09:16
The console in Apache jUDDI 3.0.0 does not properly escape line feeds, which allows remote authenticated users to spoof log entries via the numRows parameter.
CVE-2018-1307
- EPSS 1.12%
- Veröffentlicht 09.02.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:35
In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion ...
CVE-2009-1197
- EPSS 0.4%
- Veröffentlicht 30.10.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Apache jUDDI before 2.0 allows attackers to spoof entries in log files via vectors related to error logging of keys from uddiget.jsp.
CVE-2009-1198
- EPSS 0.77%
- Veröffentlicht 30.10.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Cross-site scripting (XSS) vulnerability in Apache jUDDI before 2.0 allows remote attackers to inject arbitrary web script or HTML via the dsname parameter to happyjuddi.jsp.
CVE-2015-5241
- EPSS 2.56%
- Veröffentlicht 19.05.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing ...