ID CVE-2016-8739
Summary The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:cxf:3.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.6.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.6.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:2.7.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:2.7.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cxf:3.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cxf:3.1.4:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 16-06-2021 - 12:15)
Impact:
Exploitability:
CWE CWE-611
CAPEC
  • XML External Entities Blowup
    This attack takes advantage of the entity replacement property of XML where the value of the replacement is a URI. A well-crafted XML document could have the entity refer to a URI that consumes a large amount of resources to create a denial of service condition. This can cause the system to either freeze, crash, or execute arbitrary code depending on the URI.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:N/A:N
redhat via4
advisories
rhsa
id RHSA-2017:0868
refmap via4
bid 97579
confirm http://cxf.apache.org/security-advisories.data/CVE-2016-8739.txt.asc
mlist
  • [cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
  • [cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
  • [cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html
  • [cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html
sectrack 1037544
Last major update 16-06-2021 - 12:15
Published 10-08-2017 - 18:29
Last modified 16-06-2021 - 12:15
Back to Top