Tomcat — контейнер сервлетов с открытым исходным кодом
Релизный цикл, информация об уязвимостях
График релизов
Количество 1 153
GHSA-pxwv-88pv-hh3j
org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.
GHSA-76vr-72mv-mf3q
Cross-Site Request Forgery in Apache Tomcat
GHSA-99rf-92v6-cwx4
Improper Access Control in Apache Tomcat
GHSA-7f6w-fhmr-j8hq
Jenkins HttpOnly flag not Set for session cookies
GHSA-g7cf-wg27-qw87
Jenkins secure flag not set on session cookies
GHSA-wf5v-jhxj-q632
Denial of service in Apache Tomcat
GHSA-398j-w8vh-r865
The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.
GHSA-wr3m-gw98-mc3j
Improper Input Validation in Apache Tomcat
GHSA-w7cg-5969-678w
Apache Tomcat allows remote attackers to bypass a CSRF protection mechanism by using a token
GHSA-jrcp-c39h-r29x
Improper Neutralization of Input During Web Page Generation in Apache Tomcat
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
GHSA-pxwv-88pv-hh3j org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response. | 23% Средний | больше 3 лет назад | ||
GHSA-76vr-72mv-mf3q Cross-Site Request Forgery in Apache Tomcat | 16% Средний | больше 3 лет назад | ||
GHSA-99rf-92v6-cwx4 Improper Access Control in Apache Tomcat | 3% Низкий | больше 3 лет назад | ||
GHSA-7f6w-fhmr-j8hq Jenkins HttpOnly flag not Set for session cookies | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад | |
GHSA-g7cf-wg27-qw87 Jenkins secure flag not set on session cookies | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад | |
GHSA-wf5v-jhxj-q632 Denial of service in Apache Tomcat | 13% Средний | больше 3 лет назад | ||
GHSA-398j-w8vh-r865 The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-wr3m-gw98-mc3j Improper Input Validation in Apache Tomcat | 74% Высокий | больше 3 лет назад | ||
GHSA-w7cg-5969-678w Apache Tomcat allows remote attackers to bypass a CSRF protection mechanism by using a token | CVSS3: 8.8 | 6% Низкий | больше 3 лет назад | |
GHSA-jrcp-c39h-r29x Improper Neutralization of Input During Web Page Generation in Apache Tomcat | CVSS3: 8.1 | 39% Средний | больше 3 лет назад |
Уязвимостей на страницу