Tomcat — контейнер сервлетов с открытым исходным кодом
Релизный цикл, информация об уязвимостях
График релизов
Количество 1 262
CVE-2020-17527
While investigating bug 64830 it was discovered that Apache Tomcat 10. ...
CVE-2020-17527
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
CVE-2020-17527
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
openSUSE-SU-2020:1842-1
Security update for tomcat
openSUSE-SU-2020:1799-1
Security update for tomcat
SUSE-SU-2020:3069-1
Security update for tomcat
SUSE-SU-2020:3068-1
Security update for tomcat
SUSE-SU-2020:2996-1
Security update for tomcat
BDU:2020-04938
Уязвимость сервера приложений Apache Tomcat, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2020-13943
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
|---|---|---|---|---|
CVE-2020-17527 While investigating bug 64830 it was discovered that Apache Tomcat 10. ... | CVSS3: 7.5 | 11% Средний | около 5 лет назад | |
CVE-2020-17527 While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests. | CVSS3: 7.5 | 11% Средний | около 5 лет назад | |
CVE-2020-17527 While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests. | CVSS3: 7.5 | 11% Средний | около 5 лет назад | |
openSUSE-SU-2020:1842-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
openSUSE-SU-2020:1799-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:3069-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:3068-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:2996-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
BDU:2020-04938 Уязвимость сервера приложений Apache Tomcat, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 92% Критический | больше 5 лет назад | |
CVE-2020-13943 If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. | CVSS3: 4.3 | 10% Низкий | больше 5 лет назад |
Уязвимостей на страницу