Total vulnerabilities in the database
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.
Software | From | Fixed in |
---|---|---|
apache / cxf | 3.2.0 | 3.2.12.x |
apache / cxf | 3.3.0 | 3.3.5 |
oracle / flexcube_private_banking | 12.1.0 | 12.1.0.x |
oracle / flexcube_private_banking | 12.0.0 | 12.0.0.x |
oracle / retail_order_broker | 15.0 | 15.0.x |
oracle / communications_element_manager | 8.2.0 | 8.2.0.x |
oracle / communications_element_manager | 8.2.1 | 8.2.1.x |
oracle / communications_element_manager | 8.1.1 | 8.1.1.x |
oracle / communications_session_report_manager | 8.1.1 | 8.1.1.x |
oracle / communications_session_report_manager | 8.2.0 | 8.2.0.x |
oracle / communications_session_report_manager | 8.2.1 | 8.2.1.x |
oracle / communications_session_route_manager | 8.1.1 | 8.1.1.x |
oracle / communications_session_route_manager | 8.2.0 | 8.2.0.x |
oracle / communications_session_route_manager | 8.2.1 | 8.2.1.x |
oracle / commerce_guided_search | 11.3.2 | 11.3.2.x |
![]() |
- | 3.2.12 |
![]() |
3.3.0 | 3.3.5 |
![]() |
- | 3.2.12 |
![]() |
3.3.0 | 3.3.5 |