Summary
Detail | |||
---|---|---|---|
Vendor | Oracle | First view | 2018-08-02 |
Product | Communications Design Studio | Last view | 2021-04-13 |
Version | 7.4.1.1.0 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:oracle:communications_design_studio |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.8 | 2021-04-13 | CVE-2021-29425 | In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. |
7.5 | 2019-05-01 | CVE-2019-0227 | A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue. |
6.1 | 2018-08-02 | CVE-2018-8032 | Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
50% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-08-24 | Name: The remote Fedora host is missing a security update. File: fedora_2018-8a85ed2f10.nasl - Type: ACT_GATHER_INFO |