Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5x5f-9r6q-q7mh

Опубликовано: 01 мая 2022
Источник: github
Github: Прошло ревью

Описание

Apache Tomcat Sensitive Information Disclosure

Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.

Ссылки

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 6.0.0, < 6.0.16

6.0.16

EPSS

Процентиль: 88%
0.04097
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 17 лет назад

Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.

redhat
больше 17 лет назад

Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.

nvd
больше 17 лет назад

Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.

debian
больше 17 лет назад

Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context ...

EPSS

Процентиль: 88%
0.04097
Низкий

Дефекты

CWE-200