Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/axis@1.4-28%2Bdeb11u1
Typedeb
Namespacedebian
Nameaxis
Version1.4-28+deb11u1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-zgre-mq7s-ebch
vulnerability_id VCID-zgre-mq7s-ebch
summary
Apache Axis 1.x (EOL) may allow RCE when untrusted input is passed to getService
When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.

As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from  https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40743
reference_id
reference_type
scores
0
value 0.00959
scoring_system epss
scoring_elements 0.76499
published_at 2026-04-16T12:55:00Z
1
value 0.00959
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-29T12:55:00Z
2
value 0.00959
scoring_system epss
scoring_elements 0.76531
published_at 2026-04-26T12:55:00Z
3
value 0.00959
scoring_system epss
scoring_elements 0.76525
published_at 2026-04-24T12:55:00Z
4
value 0.00959
scoring_system epss
scoring_elements 0.76491
published_at 2026-04-21T12:55:00Z
5
value 0.00959
scoring_system epss
scoring_elements 0.76503
published_at 2026-04-18T12:55:00Z
6
value 0.01164
scoring_system epss
scoring_elements 0.78569
published_at 2026-04-02T12:55:00Z
7
value 0.01164
scoring_system epss
scoring_elements 0.786
published_at 2026-04-04T12:55:00Z
8
value 0.01164
scoring_system epss
scoring_elements 0.78582
published_at 2026-04-07T12:55:00Z
9
value 0.01164
scoring_system epss
scoring_elements 0.78607
published_at 2026-04-08T12:55:00Z
10
value 0.01164
scoring_system epss
scoring_elements 0.78614
published_at 2026-04-09T12:55:00Z
11
value 0.01164
scoring_system epss
scoring_elements 0.78638
published_at 2026-04-11T12:55:00Z
12
value 0.01164
scoring_system epss
scoring_elements 0.7862
published_at 2026-04-12T12:55:00Z
13
value 0.01164
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40743
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40743
2
reference_url https://github.com/apache/axis-axis1-java
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/axis-axis1-java
3
reference_url https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
4
reference_url https://lists.apache.org/thread/gs0qgk2mgss7zfhzdd6ftfjvm4kp7v82
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://lists.apache.org/thread/gs0qgk2mgss7zfhzdd6ftfjvm4kp7v82
5
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051288
reference_id 1051288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051288
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-40743
reference_id CVE-2023-40743
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-40743
8
reference_url https://github.com/advisories/GHSA-rmqp-9w4c-gc7w
reference_id GHSA-rmqp-9w4c-gc7w
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rmqp-9w4c-gc7w
9
reference_url https://usn.ubuntu.com/6470-1/
reference_id USN-6470-1
reference_type
scores
url https://usn.ubuntu.com/6470-1/
fixed_packages
0
url pkg:deb/debian/axis@1.4-28%2Bdeb11u1
purl pkg:deb/debian/axis@1.4-28%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/axis@1.4-28%252Bdeb11u1
aliases CVE-2023-40743, GHSA-rmqp-9w4c-gc7w
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgre-mq7s-ebch
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/axis@1.4-28%252Bdeb11u1