Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-1475

Опубликовано: 08 апр. 2011
Источник: debian
EPSS Средний

Описание

The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat6not-affectedpackage

EPSS

Процентиль: 93%
0.11701
Средний

Связанные уязвимости

ubuntu
около 14 лет назад

The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users."

redhat
около 14 лет назад

The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users."

nvd
около 14 лет назад

The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users."

github
около 3 лет назад

Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users

EPSS

Процентиль: 93%
0.11701
Средний