Search for packages
| purl | pkg:maven/org.apache.santuario/xmlsec@1.4.3 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-46y3-rx34-pyc6
Aliases: CVE-2021-40690 GHSA-j8wc-gxx9-82hx |
Exposure of Sensitive Information to an Unauthorized Actor All versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-64x5-tgkj-9qb9
Aliases: CVE-2013-2172 GHSA-r237-w2w6-jq3p |
jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak "canonicalization algorithm to apply to the SignedInfo part of the Signature." |
Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. |
|
VCID-6q4h-4h6p-nufq
Aliases: CVE-2013-5823 GHSA-8gwc-x7mg-7p7p |
Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security. |
Affected by 2 other vulnerabilities. Affected by 3 other vulnerabilities. |
|
VCID-h8wa-77tk-m3av
Aliases: CVE-2013-4517 GHSA-4p4w-6h54-g885 |
Apache Santuario XML Security for Java before 1.5.6, when applying Transforms, allows remote attackers to cause a denial of service (memory consumption) via crafted Document Type Definitions (DTDs), related to signatures. |
Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-z7ht-bq8z-3qgd | XML signature HMAC truncation authentication bypass This package uses a parameter that defines an HMAC truncation length (`HMACOutputLength`) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits. |
CVE-2009-0217
GHSA-8hfm-837h-hjg5 |