Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-2902

Опубликовано: 28 янв. 2010
Источник: debian
EPSS Средний

Описание

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat6fixed6.0.24-1package
tomcat6not-affectedlennypackage
tomcat5.5removedpackage

EPSS

Процентиль: 93%
0.1008
Средний

Связанные уязвимости

ubuntu
больше 15 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

redhat
больше 15 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

nvd
больше 15 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

github
около 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat

oracle-oval
почти 15 лет назад

ELSA-2010-0580: tomcat5 security update (IMPORTANT)

EPSS

Процентиль: 93%
0.1008
Средний