Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cpr9-82wf-f629

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

EPSS

Процентиль: 94%
0.12338
Средний

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 12 лет назад

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

redhat
больше 12 лет назад

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

nvd
больше 12 лет назад

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

debian
больше 12 лет назад

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP ...

EPSS

Процентиль: 94%
0.12338
Средний

Дефекты

CWE-20