Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-0022

Опубликовано: 19 янв. 2012
Источник: debian
EPSS Средний

Описание

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat5removedpackage
tomcat6fixed6.0.35-1package
tomcat7fixed7.0.23-1package

EPSS

Процентиль: 96%
0.23046
Средний

Связанные уязвимости

ubuntu
около 14 лет назад

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

redhat
около 14 лет назад

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

nvd
около 14 лет назад

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.

github
почти 4 года назад

Denial of Service in Apache Tomcat

oracle-oval
почти 14 лет назад

ELSA-2012-0475: tomcat6 security update (MODERATE)

EPSS

Процентиль: 96%
0.23046
Средний