Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"
Tomcat

Tomcatконтейнер сервлетов с открытым исходным кодом

Релизный цикл, информация об уязвимостях

Продукт: Tomcat
Вендор: apache

График релизов

8.08.5910.010.111.02014201520162017201820192020202120222023202420252026

Недавние уязвимости Tomcat

Количество 1 153

suse-cvrf логотип

SUSE-SU-2021:0041-1

больше 4 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0031-1

больше 4 лет назад

Security update for tomcat

EPSS: Низкий
nvd логотип

CVE-2020-17527

больше 4 лет назад

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2020-17527

больше 4 лет назад

While investigating bug 64830 it was discovered that Apache Tomcat 10. ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2020-17527

больше 4 лет назад

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2020-17527

больше 4 лет назад

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1842-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1799-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3069-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3068-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
SUSE-SU-2021:0041-1

Security update for tomcat

8%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0031-1

Security update for tomcat

8%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
8%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10. ...

CVSS3: 7.5
8%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
8%
Низкий
больше 4 лет назад
redhat логотип
CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
8%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1842-1

Security update for tomcat

10%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1799-1

Security update for tomcat

10%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3069-1

Security update for tomcat

10%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3068-1

Security update for tomcat

10%
Низкий
почти 5 лет назад

Уязвимостей на страницу


Поделиться