Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache cxf 2.4.7 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2012-2379
Apache CXF 2.4.x prior to 2.4.8, 2.5.x prior to 2.5.4, and 2.6.x prior to 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
Apache Cxf 2.4.6
Apache Cxf 2.4.0
Apache Cxf 2.4.3
Apache Cxf 2.4.4
Apache Cxf 2.4.2
Apache Cxf 2.4.1
Apache Cxf 2.4.7
Apache Cxf 2.4.5
Apache Cxf 2.5.2
Apache Cxf 2.5.3
Apache Cxf 2.5.0
Apache Cxf 2.5.1
Apache Cxf 2.6.0
5
CVSSv2
CVE-2013-0239
Apache CXF prior to 2.5.9, 2.6.x prior to 2.6.6, and 2.7.x prior to 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote malicious users to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a...
Apache Cxf 2.5.2
Apache Cxf 2.4.6
Apache Cxf 2.5.3
Apache Cxf 2.4.0
Apache Cxf 2.4.3
Apache Cxf 2.5.7
Apache Cxf 2.4.4
Apache Cxf 2.4.2
Apache Cxf 2.5.0
Apache Cxf 2.5.1
Apache Cxf 2.5.5
Apache Cxf
Apache Cxf 2.4.1
Apache Cxf 2.5.6
Apache Cxf 2.4.7
Apache Cxf 2.4.5
Apache Cxf 2.5.4
Apache Cxf 2.6.0
Apache Cxf 2.6.2
Apache Cxf 2.6.5
Apache Cxf 2.6.3
Apache Cxf 2.6.4
4.3
CVSSv2
CVE-2012-2378
Apache CXF 2.4.5 up to and including 2.4.7, 2.5.1 up to and including 2.5.3, and 2.6.x prior to 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote malicious users to bypass the (1) AlgorithmSui...
Apache Cxf 2.4.6
Apache Cxf 2.4.7
Apache Cxf 2.4.5
Apache Cxf 2.5.2
Apache Cxf 2.5.3
Apache Cxf 2.5.1
Apache Cxf 2.6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started