Apache

Juddi

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.58%
  • Published 29.07.2021 07:15:06
  • Last modified 21.11.2024 06:15:27

Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RM...

  • EPSS 0.21%
  • Published 19.02.2018 16:29:00
  • Last modified 21.11.2024 01:09:16

The console in Apache jUDDI 3.0.0 does not properly escape line feeds, which allows remote authenticated users to spoof log entries via the numRows parameter.

  • EPSS 1.12%
  • Published 09.02.2018 19:29:00
  • Last modified 21.11.2024 03:59:35

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion ...

  • EPSS 0.4%
  • Published 30.10.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

Apache jUDDI before 2.0 allows attackers to spoof entries in log files via vectors related to error logging of keys from uddiget.jsp.

  • EPSS 0.77%
  • Published 30.10.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

Cross-site scripting (XSS) vulnerability in Apache jUDDI before 2.0 allows remote attackers to inject arbitrary web script or HTML via the dsname parameter to happyjuddi.jsp.

  • EPSS 2.56%
  • Published 19.05.2017 19:29:00
  • Last modified 20.04.2025 01:37:25

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing ...