Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"
Tomcat

Tomcatконтейнер сервлетов с открытым исходным кодом

Релизный цикл, информация об уязвимостях

Продукт: Tomcat
Вендор: apache

График релизов

8.08.5910.010.111.02014201520162017201820192020202120222023202420252026

Недавние уязвимости Tomcat

Количество 1 243

suse-cvrf логотип

SUSE-SU-2023:1853-1

больше 2 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1672-1

больше 2 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1669-1

больше 2 лет назад

Security update for tomcat

EPSS: Низкий
github логотип

GHSA-2c9m-w27f-53rm

больше 2 лет назад

Apache Tomcat vulnerable to Unprotected Transport of Credentials

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2023-28708

больше 2 лет назад

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2023-28708

больше 2 лет назад

When using the RemoteIpFilter with requests received from a reverse ...

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2023-28708

больше 2 лет назад

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2023-28708

больше 2 лет назад

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2025-10838

больше 2 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием флага «Secure» в файлах cookie сеанса, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-rq2w-37h9-vg94

почти 3 года назад

Apache Tomcat improperly escapes input from JsonErrorReportValve

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
SUSE-SU-2023:1853-1

Security update for tomcat

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1672-1

Security update for tomcat

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1669-1

Security update for tomcat

0%
Низкий
больше 2 лет назад
github логотип
GHSA-2c9m-w27f-53rm

Apache Tomcat vulnerable to Unprotected Transport of Credentials

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-28708

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-28708

When using the RemoteIpFilter with requests received from a reverse ...

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-28708

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-28708

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2025-10838

Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием флага «Secure» в файлах cookie сеанса, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-rq2w-37h9-vg94

Apache Tomcat improperly escapes input from JsonErrorReportValve

CVSS3: 7.5
1%
Низкий
почти 3 года назад

Уязвимостей на страницу


Поделиться