Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"
Tomcat

Tomcatконтейнер сервлетов с открытым исходным кодом

Релизный цикл, информация об уязвимостях

Продукт: Tomcat
Вендор: apache

График релизов

8.08.5910.010.111.02014201520162017201820192020202120222023202420252026

Недавние уязвимости Tomcat

Количество 1 247

suse-cvrf логотип

SUSE-SU-2020:3069-1

около 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3068-1

около 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2996-1

около 5 лет назад

Security update for tomcat

EPSS: Низкий
fstec логотип

BDU:2020-04938

около 5 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Критический
nvd логотип

CVE-2020-13943

около 5 лет назад

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2020-13943

около 5 лет назад

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7 ...

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2020-13943

около 5 лет назад

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-13943

около 5 лет назад

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1063-1

больше 5 лет назад

Security update for tomcat

EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2020:1051-1

больше 5 лет назад

Security update for tomcat

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
SUSE-SU-2020:3069-1

Security update for tomcat

10%
Низкий
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3068-1

Security update for tomcat

10%
Низкий
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2996-1

Security update for tomcat

10%
Низкий
около 5 лет назад
fstec логотип
BDU:2020-04938

Уязвимость сервера приложений Apache Tomcat, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
92%
Критический
около 5 лет назад
nvd логотип
CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 4.3
10%
Низкий
около 5 лет назад
debian логотип
CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7 ...

CVSS3: 4.3
10%
Низкий
около 5 лет назад
ubuntu логотип
CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 4.3
10%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 5.3
10%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1063-1

Security update for tomcat

39%
Средний
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1051-1

Security update for tomcat

39%
Средний
больше 5 лет назад

Уязвимостей на страницу


Поделиться