Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-0022

Опубликовано: 19 янв. 2012
Источник: debian
EPSS Средний

Описание

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat5removedpackage
tomcat6fixed6.0.35-1package
tomcat7fixed7.0.23-1package

EPSS

Процентиль: 96%
0.23274
Средний

Связанные уязвимости

ubuntu
больше 13 лет назад

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

redhat
больше 13 лет назад

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

nvd
больше 13 лет назад

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

github
около 3 лет назад

Denial of Service in Apache Tomcat

oracle-oval
около 13 лет назад

ELSA-2012-0475: tomcat6 security update (MODERATE)

EPSS

Процентиль: 96%
0.23274
Средний