Search for packages
| purl | pkg:maven/org.apache.tomee/tomee-webapp@7.0.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-46y3-rx34-pyc6
Aliases: CVE-2021-40690 GHSA-j8wc-gxx9-82hx |
Exposure of Sensitive Information to an Unauthorized Actor All versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element. |
Affected by 0 other vulnerabilities. |
|
VCID-dr52-xewb-k7hv
Aliases: CVE-2020-13931 GHSA-mp28-rq7g-qx62 |
Remote code execution in Apache TomEE If Apache TomEE - - - - is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix does not cover this edge case. |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
|
VCID-gvqm-rteu-w3e5
Aliases: CVE-2018-8031 GHSA-fg44-w3fr-hgxv |
Cross-site Scripting The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. |
Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||