Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-1157

Опубликовано: 23 апр. 2010
Источник: debian
EPSS Средний

Описание

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat6fixed6.0.26-5package
tomcat5.5removedpackage

Примечания

  • Negligible information disclosure

EPSS

Процентиль: 95%
0.18099
Средний

Связанные уязвимости

ubuntu
больше 15 лет назад

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.

redhat
больше 15 лет назад

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.

nvd
больше 15 лет назад

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.

github
больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

EPSS

Процентиль: 95%
0.18099
Средний