Total vulnerabilities in the database
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
Software | From | Fixed in |
---|---|---|
apache / axis | 1.0-rc1 | 1.0-rc1.x |
apache / axis | 1.1-rc2 | 1.1-rc2.x |
apache / axis | 1.2-alpha | 1.2-alpha.x |
apache / axis | 1.0-beta | 1.0-beta.x |
apache / axis | 1.2 | 1.2.x |
apache / axis | 1.2-rc2 | 1.2-rc2.x |
apache / axis | 1.2-rc3 | 1.2-rc3.x |
apache / axis | 1.2.1 | 1.2.1.x |
apache / axis | 1.0-rc2 | 1.0-rc2.x |
apache / axis | 1.2-beta2 | 1.2-beta2.x |
apache / axis | 1.1 | 1.1.x |
apache / axis | 1.1-rc1 | 1.1-rc1.x |
apache / axis | 1.2-rc1 | 1.2-rc1.x |
apache / axis | 1.1-beta | 1.1-beta.x |
apache / axis | 1.2-beta1 | 1.2-beta1.x |
apache / axis | - | 1.4.x |
apache / axis | 1.3 | 1.3.x |
apache / axis | 1.0 | 1.0.x |
apache / axis | 1.2-beta3 | 1.2-beta3.x |
![]() |
- | 1.4.x |