Логотип exploitDog
bind:CVE-2018-1307
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1307

Количество 3

Количество 3

redhat логотип

CVE-2018-1307

около 8 лет назад

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2018-1307

почти 8 лет назад

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-p99p-726h-c8v5

больше 7 лет назад

Apache juddi-client vulnerable to XML External Entity (XXE)

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2018-1307

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

CVSS3: 4.3
1%
Низкий
около 8 лет назад
nvd логотип
CVE-2018-1307

In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.

CVSS3: 8.1
1%
Низкий
почти 8 лет назад
github логотип
GHSA-p99p-726h-c8v5

Apache juddi-client vulnerable to XML External Entity (XXE)

CVSS3: 8.1
1%
Низкий
больше 7 лет назад

Уязвимостей на страницу