Логотип exploitDog
bind:CVE-2015-5241
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-5241

Количество 3

Количество 3

redhat логотип

CVE-2015-5241

больше 10 лет назад

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2015-5241

больше 8 лет назад

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-49h4-g8p5-jgq6

больше 7 лет назад

Moderate severity vulnerability that affects org.apache.juddi:juddi-client

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2015-5241

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

CVSS3: 5.3
3%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-5241

After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.

CVSS3: 6.1
3%
Низкий
больше 8 лет назад
github логотип
GHSA-49h4-g8p5-jgq6

Moderate severity vulnerability that affects org.apache.juddi:juddi-client

CVSS3: 6.1
3%
Низкий
больше 7 лет назад

Уязвимостей на страницу