Lookup for vulnerable packages by Package URL.

Purlpkg:maven/axis/axis@1.2-RC2
Typemaven
Namespaceaxis
Nameaxis
Version1.2-RC2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-hj44-args-tfa4
vulnerability_id VCID-hj44-args-tfa4
summary
Man-in-the-middle attack in Apache Axis
Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0269.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0269.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-0683.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0683.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-0037.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0037.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5784.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5784.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5784
reference_id
reference_type
scores
0
value 0.01566
scoring_system epss
scoring_elements 0.81583
published_at 2026-04-29T12:55:00Z
1
value 0.01566
scoring_system epss
scoring_elements 0.81454
published_at 2026-04-02T12:55:00Z
2
value 0.01566
scoring_system epss
scoring_elements 0.81475
published_at 2026-04-04T12:55:00Z
3
value 0.01566
scoring_system epss
scoring_elements 0.81473
published_at 2026-04-07T12:55:00Z
4
value 0.01566
scoring_system epss
scoring_elements 0.81501
published_at 2026-04-08T12:55:00Z
5
value 0.01566
scoring_system epss
scoring_elements 0.81506
published_at 2026-04-09T12:55:00Z
6
value 0.01566
scoring_system epss
scoring_elements 0.81527
published_at 2026-04-11T12:55:00Z
7
value 0.01566
scoring_system epss
scoring_elements 0.81514
published_at 2026-04-12T12:55:00Z
8
value 0.01566
scoring_system epss
scoring_elements 0.81507
published_at 2026-04-13T12:55:00Z
9
value 0.01566
scoring_system epss
scoring_elements 0.81543
published_at 2026-04-16T12:55:00Z
10
value 0.01566
scoring_system epss
scoring_elements 0.81545
published_at 2026-04-18T12:55:00Z
11
value 0.01566
scoring_system epss
scoring_elements 0.81547
published_at 2026-04-21T12:55:00Z
12
value 0.01566
scoring_system epss
scoring_elements 0.81569
published_at 2026-04-24T12:55:00Z
13
value 0.01566
scoring_system epss
scoring_elements 0.81578
published_at 2026-04-26T12:55:00Z
14
value 0.01566
scoring_system epss
scoring_elements 0.81443
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5784
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784
8
reference_url http://secunia.com/advisories/51219
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/51219
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79829
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79829
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5%40%3Cjava-dev.axis.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780%40%3Cjava-dev.axis.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832%40%3Cjava-dev.axis.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d%40%3Cjava-dev.axis.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c%40%3Cjava-dev.axis.apache.org%3E
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5784
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-5784
22
reference_url http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
23
reference_url http://www.securityfocus.com/bid/56408
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/56408
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692650
reference_id 692650
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692650
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=873252
reference_id 873252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=873252
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:beta:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:rc1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.0:rc2:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:beta:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:rc1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.1:rc2:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:alpha:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta2:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:beta3:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.2:rc3:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:1.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:-:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:alpha1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:alpha2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:-:alpha2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:alpha2:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:alpha3:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:-:alpha3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:alpha3:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:-:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:beta1:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:-:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:beta2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:axis:-:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:axis:-:beta3:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:paypal:mass_pay:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:paypal:mass_pay:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:paypal:mass_pay:-:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:paypal:payments_pro:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:paypal:payments_pro:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:paypal:payments_pro:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:paypal:transactional_information_soap:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:paypal:transactional_information_soap:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:paypal:transactional_information_soap:-:*:*:*:*:*:*:*
55
reference_url https://github.com/advisories/GHSA-55w9-c3g2-4rrh
reference_id GHSA-55w9-c3g2-4rrh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-55w9-c3g2-4rrh
56
reference_url https://access.redhat.com/errata/RHSA-2013:0269
reference_id RHSA-2013:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0269
57
reference_url https://access.redhat.com/errata/RHSA-2013:0683
reference_id RHSA-2013:0683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0683
58
reference_url https://access.redhat.com/errata/RHSA-2014:0037
reference_id RHSA-2014:0037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0037
59
reference_url https://access.redhat.com/errata/RHSA-2014:1123
reference_id RHSA-2014:1123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1123
fixed_packages
aliases CVE-2012-5784, GHSA-55w9-c3g2-4rrh
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj44-args-tfa4
1
url VCID-jdjt-ey4h-z3az
vulnerability_id VCID-jdjt-ey4h-z3az
summary Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
references
0
reference_url http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060%40Atlassian.JIRA%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060%40Atlassian.JIRA%3E
1
reference_url http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8032.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8032.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8032
reference_id
reference_type
scores
0
value 0.02343
scoring_system epss
scoring_elements 0.84897
published_at 2026-04-18T12:55:00Z
1
value 0.02343
scoring_system epss
scoring_elements 0.84896
published_at 2026-04-16T12:55:00Z
2
value 0.02343
scoring_system epss
scoring_elements 0.84875
published_at 2026-04-13T12:55:00Z
3
value 0.02343
scoring_system epss
scoring_elements 0.84881
published_at 2026-04-12T12:55:00Z
4
value 0.02343
scoring_system epss
scoring_elements 0.84883
published_at 2026-04-11T12:55:00Z
5
value 0.02343
scoring_system epss
scoring_elements 0.84864
published_at 2026-04-09T12:55:00Z
6
value 0.02343
scoring_system epss
scoring_elements 0.84858
published_at 2026-04-08T12:55:00Z
7
value 0.02343
scoring_system epss
scoring_elements 0.84835
published_at 2026-04-07T12:55:00Z
8
value 0.02343
scoring_system epss
scoring_elements 0.84834
published_at 2026-04-04T12:55:00Z
9
value 0.02343
scoring_system epss
scoring_elements 0.84815
published_at 2026-04-02T12:55:00Z
10
value 0.02343
scoring_system epss
scoring_elements 0.84801
published_at 2026-04-01T12:55:00Z
11
value 0.02343
scoring_system epss
scoring_elements 0.84929
published_at 2026-04-26T12:55:00Z
12
value 0.02343
scoring_system epss
scoring_elements 0.8493
published_at 2026-04-29T12:55:00Z
13
value 0.02343
scoring_system epss
scoring_elements 0.84895
published_at 2026-04-21T12:55:00Z
14
value 0.02343
scoring_system epss
scoring_elements 0.84921
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8032
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8032
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/apache/axis1-java/commit/e7ce8a92bc02be54da102efb64c99aeee21a2106
reference_id
reference_type
scores
url https://github.com/apache/axis1-java/commit/e7ce8a92bc02be54da102efb64c99aeee21a2106
7
reference_url https://issues.apache.org/jira/browse/AXIS-2924
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/AXIS-2924
8
reference_url https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b%40%3Cjava-dev.axis.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041%40%3Cjava-dev.axis.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041%40%3Cjava-dev.axis.apache.org%3E
12
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html
13
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
14
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2020.html
15
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuApr2021.html
16
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
17
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2020.html
18
reference_url https://www.oracle.com/security-alerts/cpujan2021.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2021.html
19
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2020.html
20
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
21
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
22
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1611835
reference_id 1611835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1611835
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905328
reference_id 905328
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905328
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8032
reference_id CVE-2018-8032
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-8032
26
reference_url https://github.com/advisories/GHSA-96jq-75wh-2658
reference_id GHSA-96jq-75wh-2658
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-96jq-75wh-2658
fixed_packages
aliases CVE-2018-8032, GHSA-96jq-75wh-2658
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdjt-ey4h-z3az
2
url VCID-mbzz-vcd2-mfeb
vulnerability_id VCID-mbzz-vcd2-mfeb
summary
Server-Side Request Forgery (SSRF)
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis distribution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0227.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0227
reference_id
reference_type
scores
0
value 0.89767
scoring_system epss
scoring_elements 0.99568
published_at 2026-04-13T12:55:00Z
1
value 0.89767
scoring_system epss
scoring_elements 0.99571
published_at 2026-04-24T12:55:00Z
2
value 0.89767
scoring_system epss
scoring_elements 0.99569
published_at 2026-04-18T12:55:00Z
3
value 0.89877
scoring_system epss
scoring_elements 0.99579
published_at 2026-04-29T12:55:00Z
4
value 0.89877
scoring_system epss
scoring_elements 0.99577
published_at 2026-04-26T12:55:00Z
5
value 0.90014
scoring_system epss
scoring_elements 0.99582
published_at 2026-04-12T12:55:00Z
6
value 0.90014
scoring_system epss
scoring_elements 0.9958
published_at 2026-04-04T12:55:00Z
7
value 0.90014
scoring_system epss
scoring_elements 0.99581
published_at 2026-04-07T12:55:00Z
8
value 0.90014
scoring_system epss
scoring_elements 0.99579
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0227
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0227
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd%40%3Cjava-user.axis.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd%40%3Cjava-user.axis.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
8
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuApr2021.html
11
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
12
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2020.html
13
reference_url https://www.oracle.com/security-alerts/cpujan2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2021.html
14
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2020.html
15
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
16
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
17
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1698764
reference_id 1698764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1698764
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929266
reference_id 929266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929266
20
reference_url https://github.com/RhinoSecurityLabs/CVEs/blob/d5d317bb211af59d0708fd602d83bd80b61ae37b/CVE-2019-0227/CVE-2019-0227.py
reference_id CVE-2019-0227
reference_type exploit
scores
url https://github.com/RhinoSecurityLabs/CVEs/blob/d5d317bb211af59d0708fd602d83bd80b61ae37b/CVE-2019-0227/CVE-2019-0227.py
21
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/46682.py
reference_id CVE-2019-0227
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/46682.py
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-0227
reference_id CVE-2019-0227
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-0227
23
reference_url https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis
reference_id CVE-2019-0227-EXPIRED-DOMAIN-RCE-APACHE-AXIS
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis
24
reference_url https://github.com/advisories/GHSA-h9gj-rqrw-x4fq
reference_id GHSA-h9gj-rqrw-x4fq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h9gj-rqrw-x4fq
fixed_packages
aliases CVE-2019-0227, GHSA-h9gj-rqrw-x4fq
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mbzz-vcd2-mfeb
3
url VCID-zgre-mq7s-ebch
vulnerability_id VCID-zgre-mq7s-ebch
summary
Apache Axis 1.x (EOL) may allow RCE when untrusted input is passed to getService
When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.

As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from  https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40743
reference_id
reference_type
scores
0
value 0.00959
scoring_system epss
scoring_elements 0.76499
published_at 2026-04-16T12:55:00Z
1
value 0.00959
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-29T12:55:00Z
2
value 0.00959
scoring_system epss
scoring_elements 0.76531
published_at 2026-04-26T12:55:00Z
3
value 0.00959
scoring_system epss
scoring_elements 0.76525
published_at 2026-04-24T12:55:00Z
4
value 0.00959
scoring_system epss
scoring_elements 0.76491
published_at 2026-04-21T12:55:00Z
5
value 0.00959
scoring_system epss
scoring_elements 0.76503
published_at 2026-04-18T12:55:00Z
6
value 0.01164
scoring_system epss
scoring_elements 0.78569
published_at 2026-04-02T12:55:00Z
7
value 0.01164
scoring_system epss
scoring_elements 0.786
published_at 2026-04-04T12:55:00Z
8
value 0.01164
scoring_system epss
scoring_elements 0.78582
published_at 2026-04-07T12:55:00Z
9
value 0.01164
scoring_system epss
scoring_elements 0.78607
published_at 2026-04-08T12:55:00Z
10
value 0.01164
scoring_system epss
scoring_elements 0.78614
published_at 2026-04-09T12:55:00Z
11
value 0.01164
scoring_system epss
scoring_elements 0.78638
published_at 2026-04-11T12:55:00Z
12
value 0.01164
scoring_system epss
scoring_elements 0.7862
published_at 2026-04-12T12:55:00Z
13
value 0.01164
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40743
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40743
2
reference_url https://github.com/apache/axis-axis1-java
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/axis-axis1-java
3
reference_url https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
4
reference_url https://lists.apache.org/thread/gs0qgk2mgss7zfhzdd6ftfjvm4kp7v82
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://lists.apache.org/thread/gs0qgk2mgss7zfhzdd6ftfjvm4kp7v82
5
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-18T15:52:10Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051288
reference_id 1051288
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051288
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-40743
reference_id CVE-2023-40743
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-40743
8
reference_url https://github.com/advisories/GHSA-rmqp-9w4c-gc7w
reference_id GHSA-rmqp-9w4c-gc7w
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rmqp-9w4c-gc7w
9
reference_url https://usn.ubuntu.com/6470-1/
reference_id USN-6470-1
reference_type
scores
url https://usn.ubuntu.com/6470-1/
fixed_packages
aliases CVE-2023-40743, GHSA-rmqp-9w4c-gc7w
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgre-mq7s-ebch
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/axis/axis@1.2-RC2