Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"
Tomcat

Tomcatконтейнер сервлетов с открытым исходным кодом

Релизный цикл, информация об уязвимостях

Продукт: Tomcat
Вендор: apache

График релизов

8.08.5910.010.111.020142015201620172018201920202021202220232024202520262027

Недавние уязвимости Tomcat

Количество 1 262

debian логотип

CVE-2022-34305

больше 3 лет назад

In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 ...

CVSS3: 6.1
EPSS: Средний
ubuntu логотип

CVE-2022-34305

больше 3 лет назад

In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.

CVSS3: 6.1
EPSS: Средний
redhat логотип

CVE-2022-34305

больше 3 лет назад

In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.

CVSS3: 5.4
EPSS: Средний
fstec логотип

BDU:2022-03746

больше 3 лет назад

Уязвимость в примерах проверки подлинности с помощью форм в примерах веб-приложений сервера приложений Apache Tomcat, позволяющая нарушителю провести атаку межсайтового скриптинга

CVSS3: 6.1
EPSS: Средний
github логотип

GHSA-x59f-cpgf-vmmv

больше 3 лет назад

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts)....

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-rp8h-vr48-4j8p

больше 3 лет назад

Apache Tomcat Exposes IP Addresses and HTTP Headers of Requests

EPSS: Низкий
github логотип

GHSA-r22m-cc5w-vgh3

больше 3 лет назад

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."

EPSS: Низкий
github логотип

GHSA-v6c7-8qx5-8gmp

больше 3 лет назад

Deserialization of Untrusted Data in Apache Tomcat

EPSS: Низкий
github логотип

GHSA-cw29-r48c-h5f9

больше 3 лет назад

org/apache/catalina/core/DefaultInstanceManager.java in Apache Tomcat 7.x before 7.0.22 does not properly restrict ContainerServlets in the Manager application, which allows local users to gain privileges by using an untrusted web application to access the Manager application's functionality.

EPSS: Низкий
github логотип

GHSA-r7c8-hghc-2mp8

больше 3 лет назад

Apache Tomcat Allows Replacing of XML Parser

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2022-34305

In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 ...

CVSS3: 6.1
21%
Средний
больше 3 лет назад
ubuntu логотип
CVE-2022-34305

In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.

CVSS3: 6.1
21%
Средний
больше 3 лет назад
redhat логотип
CVE-2022-34305

In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.

CVSS3: 5.4
21%
Средний
больше 3 лет назад
fstec логотип
BDU:2022-03746

Уязвимость в примерах проверки подлинности с помощью форм в примерах веб-приложений сервера приложений Apache Tomcat, позволяющая нарушителю провести атаку межсайтового скриптинга

CVSS3: 6.1
21%
Средний
больше 3 лет назад
github логотип
GHSA-x59f-cpgf-vmmv

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts)....

CVSS3: 5.9
2%
Низкий
больше 3 лет назад
github логотип
GHSA-rp8h-vr48-4j8p

Apache Tomcat Exposes IP Addresses and HTTP Headers of Requests

2%
Низкий
больше 3 лет назад
github логотип
GHSA-r22m-cc5w-vgh3

** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator."

1%
Низкий
больше 3 лет назад
github логотип
GHSA-v6c7-8qx5-8gmp

Deserialization of Untrusted Data in Apache Tomcat

5%
Низкий
больше 3 лет назад
github логотип
GHSA-cw29-r48c-h5f9

org/apache/catalina/core/DefaultInstanceManager.java in Apache Tomcat 7.x before 7.0.22 does not properly restrict ContainerServlets in the Manager application, which allows local users to gain privileges by using an untrusted web application to access the Manager application's functionality.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-r7c8-hghc-2mp8

Apache Tomcat Allows Replacing of XML Parser

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться