CVE-2019-12400
Published at:
-
23-08-2019 11:15
Last modified:
-
13-04-2022 04:49
Total changes:
-
4
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Local
Attack vector
None
Availability
None
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
5.5
Base score
1.8
3.6
Exploitability score
Impact score
Verification logic
Reference
- http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2
- [santuario-dev] 20190905 Re: [CVE-2019-12400] Apache Santuario potentially loads XML parsing code from an untrusted source-Issue Tracking, Vendor Advisory
- [santuario-dev] 20190906 Re: [CVE-2019-12400] Apache Santuario potentially loads XML parsing code from an untrusted source-Issue Tracking, Vendor Advisory
- https://security.netapp.com/advisory/ntap-20190910-0003/
- RHSA-2020:0804-Third Party Advisory
- RHSA-2020:0805-Third Party Advisory
- RHSA-2020:0811-Third Party Advisory
- RHSA-2020:0806-Third Party Advisory
- [tomee-commits] 20200324 [jira] [Created] (TOMEE-2791) TomEE plus(7.0.7) is affected by CVE-2019-12400 vulnerability-Mailing List, Vendor Advisory
- [tomee-commits] 20200720 [jira] [Created] (TOMEE-2885) Update Apache XML Security for Java to mitigate CVE-2019-12400-Mailing List, Vendor Advisory
- [tomee-commits] 20200720 [jira] [Assigned] (TOMEE-2885) Update Apache XML Security for Java to mitigate CVE-2019-12400-Mailing List, Vendor Advisory
- [tomee-commits] 20200720 [jira] [Commented] (TOMEE-2885) Update Apache XML Security for Java to mitigate CVE-2019-12400-Mailing List, Vendor Advisory
- [santuario-commits] 20210917 svn commit: r1076843 - in /websites/production/santuario/content: cache/main.pageCache index.html javaindex.html secadv.data/CVE-2021-40690.txt.asc secadv.html-Mailing List, Patch, Vendor Advisory
- https://www.oracle.com/security-alerts/cpuoct2021.html
Keywords