Apache Software Foundation Apache Juddi vulnerabilities

3 known vulnerabilities affecting apache_software_foundation/apache_juddi.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM1

Vulnerabilities

Page 1 of 1
CVE-2021-37578CRITICALCVSS 9.8≥ unspecified, < 3.3.102021-07-29
CVE-2021-37578 [CRITICAL] CWE-502 CVE-2021-37578: Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an exte Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. T
cvelistv5nvd
CVE-2018-1307HIGHCVSS 8.1v3.2 to 3.3.42018-02-09
CVE-2018-1307 [HIGH] CWE-611 CVE-2018-1307: In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.
cvelistv5nvd
CVE-2015-5241MEDIUMCVSS 6.1v3.1.2, 3.1.3, 3.1.4, and 3.1.52017-05-19
CVE-2015-5241 [MEDIUM] CWE-601 CVE-2015-5241: After logging into the portal, the logout jsp page redirects the browser back to the login page afte After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console
cvelistv5nvd