Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"
Tomcat

Tomcatконтейнер сервлетов с открытым исходным кодом

Релизный цикл, информация об уязвимостях

Продукт: Tomcat
Вендор: apache

График релизов

8.08.5910.010.111.020142015201620172018201920202021202220232024202520262027

Недавние уязвимости Tomcat

Количество 1 262

github логотип

GHSA-c9hw-wf7x-jp9j

больше 5 лет назад

Improper Privilege Management in Tomcat

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-qcxh-w3j9-58qr

больше 5 лет назад

Apache Tomcat Denial of Service vulnerability

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2020:0711-1

больше 5 лет назад

Security update for tomcat

EPSS: Критический
github логотип

GHSA-344f-f5vg-2jfj

больше 5 лет назад

Potential remote code execution in Apache Tomcat

CVSS3: 7
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2020:1365-1

больше 5 лет назад

Security update for tomcat

EPSS: Критический
suse-cvrf логотип

SUSE-SU-2020:1364-1

больше 5 лет назад

Security update for tomcat

EPSS: Критический
suse-cvrf логотип

SUSE-SU-2020:1363-1

больше 5 лет назад

Security update for tomcat

EPSS: Критический
nvd логотип

CVE-2020-9484

больше 5 лет назад

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

CVSS3: 7
EPSS: Критический
debian логотип

CVE-2020-9484

больше 5 лет назад

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to ...

CVSS3: 7
EPSS: Критический
ubuntu логотип

CVE-2020-9484

больше 5 лет назад

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

CVSS3: 7
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-c9hw-wf7x-jp9j

Improper Privilege Management in Tomcat

CVSS3: 9.8
94%
Критический
больше 5 лет назад
github логотип
GHSA-qcxh-w3j9-58qr

Apache Tomcat Denial of Service vulnerability

CVSS3: 7.5
66%
Средний
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0711-1

Security update for tomcat

93%
Критический
больше 5 лет назад
github логотип
GHSA-344f-f5vg-2jfj

Potential remote code execution in Apache Tomcat

CVSS3: 7
93%
Критический
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1365-1

Security update for tomcat

93%
Критический
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1364-1

Security update for tomcat

93%
Критический
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1363-1

Security update for tomcat

93%
Критический
больше 5 лет назад
nvd логотип
CVE-2020-9484

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

CVSS3: 7
93%
Критический
больше 5 лет назад
debian логотип
CVE-2020-9484

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to ...

CVSS3: 7
93%
Критический
больше 5 лет назад
ubuntu логотип
CVE-2020-9484

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

CVSS3: 7
93%
Критический
больше 5 лет назад

Уязвимостей на страницу


Поделиться