Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-mbzz-vcd2-mfeb
Summary
Server-Side Request Forgery (SSRF)
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis distribution.
Aliases
0
alias CVE-2019-0227
1
alias GHSA-h9gj-rqrw-x4fq
Fixed_packages
Affected_packages
0
url pkg:maven/axis/axis@1.0
purl pkg:maven/axis/axis@1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.0
1
url pkg:maven/axis/axis@1.1-beta
purl pkg:maven/axis/axis@1.1-beta
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.1-beta
2
url pkg:maven/axis/axis@1.1
purl pkg:maven/axis/axis@1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.1
3
url pkg:maven/axis/axis@1.2-alpha-1
purl pkg:maven/axis/axis@1.2-alpha-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2-alpha-1
4
url pkg:maven/axis/axis@1.2-beta-2
purl pkg:maven/axis/axis@1.2-beta-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2-beta-2
5
url pkg:maven/axis/axis@1.2-beta-3
purl pkg:maven/axis/axis@1.2-beta-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2-beta-3
6
url pkg:maven/axis/axis@1.2-RC1
purl pkg:maven/axis/axis@1.2-RC1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2-RC1
7
url pkg:maven/axis/axis@1.2-RC2
purl pkg:maven/axis/axis@1.2-RC2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2-RC2
8
url pkg:maven/axis/axis@1.2-RC3
purl pkg:maven/axis/axis@1.2-RC3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2-RC3
9
url pkg:maven/axis/axis@1.2
purl pkg:maven/axis/axis@1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2
10
url pkg:maven/axis/axis@1.2.1
purl pkg:maven/axis/axis@1.2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2.1
11
url pkg:maven/axis/axis@1.3
purl pkg:maven/axis/axis@1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24xc-gnxw-5qhq
1
vulnerability VCID-hj44-args-tfa4
2
vulnerability VCID-jdjt-ey4h-z3az
3
vulnerability VCID-mbzz-vcd2-mfeb
4
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.3
12
url pkg:maven/axis/axis@1.4
purl pkg:maven/axis/axis@1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-xydr-nxmx-wffp
4
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.4
13
url pkg:maven/org.apache.axis/axis@1.4
purl pkg:maven/org.apache.axis/axis@1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hj44-args-tfa4
1
vulnerability VCID-jdjt-ey4h-z3az
2
vulnerability VCID-mbzz-vcd2-mfeb
3
vulnerability VCID-xydr-nxmx-wffp
4
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.axis/axis@1.4
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0227.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0227
reference_id
reference_type
scores
0
value 0.89767
scoring_system epss
scoring_elements 0.99568
published_at 2026-04-13T12:55:00Z
1
value 0.89767
scoring_system epss
scoring_elements 0.99571
published_at 2026-04-24T12:55:00Z
2
value 0.89767
scoring_system epss
scoring_elements 0.99569
published_at 2026-04-18T12:55:00Z
3
value 0.89877
scoring_system epss
scoring_elements 0.99579
published_at 2026-04-29T12:55:00Z
4
value 0.89877
scoring_system epss
scoring_elements 0.99577
published_at 2026-04-26T12:55:00Z
5
value 0.90014
scoring_system epss
scoring_elements 0.99582
published_at 2026-04-12T12:55:00Z
6
value 0.90014
scoring_system epss
scoring_elements 0.9958
published_at 2026-04-04T12:55:00Z
7
value 0.90014
scoring_system epss
scoring_elements 0.99581
published_at 2026-04-07T12:55:00Z
8
value 0.90014
scoring_system epss
scoring_elements 0.99579
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0227
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0227
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd%40%3Cjava-user.axis.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd%40%3Cjava-user.axis.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
8
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuApr2021.html
11
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
12
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2020.html
13
reference_url https://www.oracle.com/security-alerts/cpujan2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2021.html
14
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2020.html
15
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
16
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
17
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1698764
reference_id 1698764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1698764
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929266
reference_id 929266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929266
20
reference_url https://github.com/RhinoSecurityLabs/CVEs/blob/d5d317bb211af59d0708fd602d83bd80b61ae37b/CVE-2019-0227/CVE-2019-0227.py
reference_id CVE-2019-0227
reference_type exploit
scores
url https://github.com/RhinoSecurityLabs/CVEs/blob/d5d317bb211af59d0708fd602d83bd80b61ae37b/CVE-2019-0227/CVE-2019-0227.py
21
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/46682.py
reference_id CVE-2019-0227
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/46682.py
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-0227
reference_id CVE-2019-0227
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-0227
23
reference_url https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis
reference_id CVE-2019-0227-EXPIRED-DOMAIN-RCE-APACHE-AXIS
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis
24
reference_url https://github.com/advisories/GHSA-h9gj-rqrw-x4fq
reference_id GHSA-h9gj-rqrw-x4fq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h9gj-rqrw-x4fq
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 918
name Server-Side Request Forgery (SSRF)
description The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 547
name Use of Hard-coded, Security-relevant Constants
description The product uses hard-coded constants instead of symbolic names for security-critical values, which increases the likelihood of mistakes during code maintenance or security policy change.
Exploits
0
date_added 2019-04-09
description Apache Axis 1.4 - Remote Code Execution
required_action null
due_date null
notes null
known_ransomware_campaign_use false
source_date_published 2019-04-09
exploit_type remote
platform multiple
source_date_updated 2019-04-09
data_source Exploit-DB
source_url https://github.com/RhinoSecurityLabs/CVEs/blob/d5d317bb211af59d0708fd602d83bd80b61ae37b/CVE-2019-0227/CVE-2019-0227.py
Severity_range_score7.0 - 8.9
Exploitability2.0
Weighted_severity8.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-mbzz-vcd2-mfeb