Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/axis@1.4-22
Typedeb
Namespacedebian
Nameaxis
Version1.4-22
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.4-28+deb11u1
Latest_non_vulnerable_version1.4-28+deb11u1
Affected_by_vulnerabilities
0
url VCID-jdjt-ey4h-z3az
vulnerability_id VCID-jdjt-ey4h-z3az
summary Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
references
0
reference_url http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060%40Atlassian.JIRA%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060%40Atlassian.JIRA%3E
1
reference_url http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8032.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8032.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8032
reference_id
reference_type
scores
0
value 0.02343
scoring_system epss
scoring_elements 0.84897
published_at 2026-04-18T12:55:00Z
1
value 0.02343
scoring_system epss
scoring_elements 0.84896
published_at 2026-04-16T12:55:00Z
2
value 0.02343
scoring_system epss
scoring_elements 0.84875
published_at 2026-04-13T12:55:00Z
3
value 0.02343
scoring_system epss
scoring_elements 0.84881
published_at 2026-04-12T12:55:00Z
4
value 0.02343
scoring_system epss
scoring_elements 0.84883
published_at 2026-04-11T12:55:00Z
5
value 0.02343
scoring_system epss
scoring_elements 0.84864
published_at 2026-04-09T12:55:00Z
6
value 0.02343
scoring_system epss
scoring_elements 0.84858
published_at 2026-04-08T12:55:00Z
7
value 0.02343
scoring_system epss
scoring_elements 0.84835
published_at 2026-04-07T12:55:00Z
8
value 0.02343
scoring_system epss
scoring_elements 0.84834
published_at 2026-04-04T12:55:00Z
9
value 0.02343
scoring_system epss
scoring_elements 0.84815
published_at 2026-04-02T12:55:00Z
10
value 0.02343
scoring_system epss
scoring_elements 0.84801
published_at 2026-04-01T12:55:00Z
11
value 0.02343
scoring_system epss
scoring_elements 0.84929
published_at 2026-04-26T12:55:00Z
12
value 0.02343
scoring_system epss
scoring_elements 0.8493
published_at 2026-04-29T12:55:00Z
13
value 0.02343
scoring_system epss
scoring_elements 0.84895
published_at 2026-04-21T12:55:00Z
14
value 0.02343
scoring_system epss
scoring_elements 0.84921
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8032
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8032
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/apache/axis1-java/commit/e7ce8a92bc02be54da102efb64c99aeee21a2106
reference_id
reference_type
scores
url https://github.com/apache/axis1-java/commit/e7ce8a92bc02be54da102efb64c99aeee21a2106
7
reference_url https://issues.apache.org/jira/browse/AXIS-2924
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/AXIS-2924
8
reference_url https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b%40%3Cjava-dev.axis.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041%40%3Cjava-dev.axis.apache.org%3E
12
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html
13
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
14
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2020.html
15
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuApr2021.html
16
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
17
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2020.html
18
reference_url https://www.oracle.com/security-alerts/cpujan2021.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2021.html
19
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2020.html
20
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
21
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
22
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1611835
reference_id 1611835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1611835
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905328
reference_id 905328
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905328
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8032
reference_id CVE-2018-8032
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-8032
26
reference_url https://github.com/advisories/GHSA-96jq-75wh-2658
reference_id GHSA-96jq-75wh-2658
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-96jq-75wh-2658
fixed_packages
0
url pkg:deb/debian/axis@1.4-28
purl pkg:deb/debian/axis@1.4-28
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/axis@1.4-28
aliases CVE-2018-8032, GHSA-96jq-75wh-2658
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdjt-ey4h-z3az
1
url VCID-zgre-mq7s-ebch
vulnerability_id VCID-zgre-mq7s-ebch
summary
Apache Axis 1.x (EOL) may allow RCE when untrusted input is passed to getService
When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.

As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from  https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40743
reference_id
reference_type
scores
0
value 0.00959
scoring_system epss
scoring_elements 0.76499
published_at 2026-04-16T12:55:00Z
1
value 0.00959
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-29T12:55:00Z
2
value 0.00959
scoring_system epss
scoring_elements 0.76531
published_at 2026-04-26T12:55:00Z
3
value 0.00959
scoring_system epss
scoring_elements 0.76525
published_at 2026-04-24T12:55:00Z
4
value 0.00959
scoring_system epss
scoring_elements 0.76491
published_at 2026-04-21T12:55:00Z
5
value 0.00959
scoring_system epss
scoring_elements 0.76503
published_at 2026-04-18T12:55:00Z
6
value 0.01164
scoring_system epss
scoring_elements 0.78569
published_at 2026-04-02T12:55:00Z
7
value 0.01164
scoring_system epss
scoring_elements 0.786
published_at 2026-04-04T12:55:00Z
8
value 0.01164
scoring_system epss
scoring_elements 0.78582
published_at 2026-04-07T12:55:00Z
9
value 0.01164
scoring_system epss
scoring_elements 0.78607
published_at 2026-04-08T12:55:00Z
10
value 0.01164
scoring_system epss
scoring_elements 0.78614
published_at 2026-04-09T12:55:00Z
11
value 0.01164
scoring_system epss
scoring_elements 0.78638
published_at 2026-04-11T12:55:00Z
12
value 0.01164
scoring_system epss
scoring_elements 0.7862
published_at 2026-04-12T12:55:00Z
13
value 0.01164
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40743
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40743
2
reference_url https://github.com/apache/axis-axis1-java
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/axis-axis1-java
3
reference_url https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
4
reference_url https://lists.apache.org/thread/gs0qgk2mgss7zfhzdd6ftfjvm4kp7v82
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://lists.apache.org/thread/gs0qgk2mgss7zfhzdd6ftfjvm4kp7v82
5
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051288
reference_id 1051288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051288
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-40743
reference_id CVE-2023-40743
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-40743
8
reference_url https://github.com/advisories/GHSA-rmqp-9w4c-gc7w
reference_id GHSA-rmqp-9w4c-gc7w
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rmqp-9w4c-gc7w
9
reference_url https://usn.ubuntu.com/6470-1/
reference_id USN-6470-1
reference_type
scores
url https://usn.ubuntu.com/6470-1/
fixed_packages
0
url pkg:deb/debian/axis@1.4-28%2Bdeb11u1
purl pkg:deb/debian/axis@1.4-28%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/axis@1.4-28%252Bdeb11u1
aliases CVE-2023-40743, GHSA-rmqp-9w4c-gc7w
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgre-mq7s-ebch
Fixing_vulnerabilities
0
url VCID-xydr-nxmx-wffp
vulnerability_id VCID-xydr-nxmx-wffp
summary
Improper Validation of Certificate with Host Mismatch
The `getCN` function in Apache Axis does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or `subjectAltName` field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the `CN` field.
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-1193.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://linux.oracle.com/errata/ELSA-2014-1193.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-1193.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-1193.html
4
reference_url https://access.redhat.com/errata/RHSA-2014:1193
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2014:1193
5
reference_url https://access.redhat.com/errata/RHSA-2015:1010
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2015:1010
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3596.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3596.json
7
reference_url https://access.redhat.com/security/cve/CVE-2014-3596
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3596
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3596
reference_id
reference_type
scores
0
value 0.01225
scoring_system epss
scoring_elements 0.792
published_at 2026-04-29T12:55:00Z
1
value 0.01225
scoring_system epss
scoring_elements 0.79066
published_at 2026-04-01T12:55:00Z
2
value 0.01225
scoring_system epss
scoring_elements 0.79072
published_at 2026-04-02T12:55:00Z
3
value 0.01225
scoring_system epss
scoring_elements 0.79099
published_at 2026-04-04T12:55:00Z
4
value 0.01225
scoring_system epss
scoring_elements 0.79084
published_at 2026-04-07T12:55:00Z
5
value 0.01225
scoring_system epss
scoring_elements 0.79109
published_at 2026-04-08T12:55:00Z
6
value 0.01225
scoring_system epss
scoring_elements 0.79116
published_at 2026-04-09T12:55:00Z
7
value 0.01225
scoring_system epss
scoring_elements 0.79141
published_at 2026-04-21T12:55:00Z
8
value 0.01225
scoring_system epss
scoring_elements 0.79127
published_at 2026-04-12T12:55:00Z
9
value 0.01225
scoring_system epss
scoring_elements 0.79117
published_at 2026-04-13T12:55:00Z
10
value 0.01225
scoring_system epss
scoring_elements 0.79145
published_at 2026-04-16T12:55:00Z
11
value 0.01225
scoring_system epss
scoring_elements 0.79142
published_at 2026-04-18T12:55:00Z
12
value 0.01225
scoring_system epss
scoring_elements 0.79175
published_at 2026-04-24T12:55:00Z
13
value 0.01225
scoring_system epss
scoring_elements 0.79182
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3596
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1129935
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1129935
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3596
11
reference_url http://secunia.com/advisories/61222
reference_id
reference_type
scores
url http://secunia.com/advisories/61222
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95377
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95377
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://issues.apache.org/jira/browse/AXIS-2905
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/AXIS-2905
15
reference_url https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5%40%3Cjava-dev.axis.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780%40%3Cjava-dev.axis.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832%40%3Cjava-dev.axis.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d%40%3Cjava-dev.axis.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c%40%3Cjava-dev.axis.apache.org%3E
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3596
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3596
26
reference_url https://web.archive.org/web/20160815194947/http://www.securitytracker.com/id/1030745
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20160815194947/http://www.securitytracker.com/id/1030745
27
reference_url https://web.archive.org/web/20200227173427/http://www.securityfocus.com/bid/69295
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200227173427/http://www.securityfocus.com/bid/69295
28
reference_url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3596
reference_id
reference_type
scores
url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3596
29
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2020.html
30
reference_url http://www.openwall.com/lists/oss-security/2014/08/20/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/08/20/2
31
reference_url http://www.securityfocus.com/bid/69295
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69295
32
reference_url http://www.securitytracker.com/id/1030745
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030745
33
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762444
reference_id 762444
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762444
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*
53
reference_url https://github.com/advisories/GHSA-r53v-vm87-f72c
reference_id GHSA-r53v-vm87-f72c
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r53v-vm87-f72c
fixed_packages
0
url pkg:deb/debian/axis@1.4-22
purl pkg:deb/debian/axis@1.4-22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jdjt-ey4h-z3az
1
vulnerability VCID-zgre-mq7s-ebch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/axis@1.4-22
aliases CVE-2014-3596, GHSA-r53v-vm87-f72c
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xydr-nxmx-wffp
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/axis@1.4-22