Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"
Tomcat

Tomcatконтейнер сервлетов с открытым исходным кодом

Релизный цикл, информация об уязвимостях

Продукт: Tomcat
Вендор: apache

График релизов

8.08.5910.010.111.020142015201620172018201920202021202220232024202520262027

Недавние уязвимости Tomcat

Количество 1 262

debian логотип

CVE-2019-0199

почти 7 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5. ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2019-0199

почти 7 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-0232

почти 7 лет назад

When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).

CVSS3: 5.9
EPSS: Критический
redhat логотип

CVE-2019-0199

почти 7 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-xx68-jfcg-xmmf

около 7 лет назад

Commons FileUpload Denial of service vulnerability

EPSS: Критический
github логотип

GHSA-fvm3-cfvj-gxqq

около 7 лет назад

High severity vulnerability that affects commons-fileupload:commons-fileupload

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2018:4042-1

около 7 лет назад

Security update for tomcat

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2018:3968-1

около 7 лет назад

Security update for tomcat

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2018:3935-1

около 7 лет назад

Security update for tomcat6

EPSS: Высокий
suse-cvrf логотип

openSUSE-SU-2018:3453-1

больше 7 лет назад

Security update for tomcat

EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2019-0199

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5. ...

CVSS3: 7.5
66%
Средний
почти 7 лет назад
ubuntu логотип
CVE-2019-0199

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

CVSS3: 7.5
66%
Средний
почти 7 лет назад
redhat логотип
CVE-2019-0232

When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).

CVSS3: 5.9
94%
Критический
почти 7 лет назад
redhat логотип
CVE-2019-0199

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

CVSS3: 7.5
66%
Средний
почти 7 лет назад
github логотип
GHSA-xx68-jfcg-xmmf

Commons FileUpload Denial of service vulnerability

93%
Критический
около 7 лет назад
github логотип
GHSA-fvm3-cfvj-gxqq

High severity vulnerability that affects commons-fileupload:commons-fileupload

CVSS3: 7.5
36%
Средний
около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:4042-1

Security update for tomcat

85%
Высокий
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3968-1

Security update for tomcat

85%
Высокий
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3935-1

Security update for tomcat6

85%
Высокий
около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:3453-1

Security update for tomcat

85%
Высокий
больше 7 лет назад

Уязвимостей на страницу


Поделиться