Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/axis/axis@1.2-RC2
purl pkg:maven/axis/axis@1.2-RC2
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-hj44-args-tfa4
Aliases:
CVE-2012-5784
GHSA-55w9-c3g2-4rrh
Man-in-the-middle attack in Apache Axis Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. There are no reported fixed by versions.
VCID-jdjt-ey4h-z3az
Aliases:
CVE-2018-8032
GHSA-96jq-75wh-2658
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services. There are no reported fixed by versions.
VCID-mbzz-vcd2-mfeb
Aliases:
CVE-2019-0227
GHSA-h9gj-rqrw-x4fq
Server-Side Request Forgery (SSRF) A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis distribution. There are no reported fixed by versions.
VCID-zgre-mq7s-ebch
Aliases:
CVE-2023-40743
GHSA-rmqp-9w4c-gc7w
Apache Axis 1.x (EOL) may allow RCE when untrusted input is passed to getService When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-29T21:18:09.932849+00:00 GitLab Importer Affected by VCID-zgre-mq7s-ebch https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2023-40743.yml 38.5.0
2026-04-29T19:50:27.642013+00:00 GitLab Importer Affected by VCID-hj44-args-tfa4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2012-5784.yml 38.5.0
2026-04-29T19:31:13.473616+00:00 GitLab Importer Affected by VCID-mbzz-vcd2-mfeb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2019-0227.yml 38.5.0
2026-04-29T19:25:16.788443+00:00 GitLab Importer Affected by VCID-jdjt-ey4h-z3az https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2018-8032.yml 38.5.0
2026-04-16T22:37:15.924143+00:00 GitLab Importer Affected by VCID-zgre-mq7s-ebch https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2023-40743.yml 38.4.0
2026-04-16T21:12:45.876215+00:00 GitLab Importer Affected by VCID-hj44-args-tfa4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2012-5784.yml 38.4.0
2026-04-16T20:54:20.120615+00:00 GitLab Importer Affected by VCID-mbzz-vcd2-mfeb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2019-0227.yml 38.4.0
2026-04-16T20:48:21.041989+00:00 GitLab Importer Affected by VCID-jdjt-ey4h-z3az https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2018-8032.yml 38.4.0
2026-04-11T23:56:33.720540+00:00 GitLab Importer Affected by VCID-zgre-mq7s-ebch https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2023-40743.yml 38.3.0
2026-04-11T22:24:45.305656+00:00 GitLab Importer Affected by VCID-hj44-args-tfa4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2012-5784.yml 38.3.0
2026-04-11T22:05:17.671784+00:00 GitLab Importer Affected by VCID-mbzz-vcd2-mfeb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2019-0227.yml 38.3.0
2026-04-11T21:59:13.624515+00:00 GitLab Importer Affected by VCID-jdjt-ey4h-z3az https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2018-8032.yml 38.3.0
2026-04-02T23:59:39.532812+00:00 GitLab Importer Affected by VCID-zgre-mq7s-ebch https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2023-40743.yml 38.1.0
2026-04-02T22:36:37.828878+00:00 GitLab Importer Affected by VCID-hj44-args-tfa4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2012-5784.yml 38.1.0
2026-04-02T22:18:10.489232+00:00 GitLab Importer Affected by VCID-mbzz-vcd2-mfeb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2019-0227.yml 38.1.0
2026-04-02T22:12:28.886416+00:00 GitLab Importer Affected by VCID-jdjt-ey4h-z3az https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2018-8032.yml 38.1.0
2026-04-01T16:53:53.772046+00:00 GitLab Importer Affected by VCID-hj44-args-tfa4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2012-5784.yml 38.0.0
2026-04-01T16:35:50.549035+00:00 GitLab Importer Affected by VCID-mbzz-vcd2-mfeb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2019-0227.yml 38.0.0
2026-04-01T16:29:52.694747+00:00 GitLab Importer Affected by VCID-jdjt-ey4h-z3az https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/axis/axis/CVE-2018-8032.yml 38.0.0