Логотип exploitDog
bind:"CVE-2016-8745" OR bind:"CVE-2016-6816"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2016-8745" OR bind:"CVE-2016-6816"

Количество 21

Количество 21

oracle-oval логотип

ELSA-2017-0935

почти 9 лет назад

ELSA-2017-0935: tomcat security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-0527

почти 9 лет назад

ELSA-2017-0527: tomcat6 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1632-1

больше 8 лет назад

Security update for tomcat6

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1660-1

больше 8 лет назад

Security update for tomcat

EPSS: Низкий
ubuntu логотип

CVE-2016-8745

больше 8 лет назад

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2016-8745

около 9 лет назад

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2016-8745

больше 8 лет назад

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2016-8745

больше 8 лет назад

A bug in the error handling of the send file code for the NIO HTTP con ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2016-6816

почти 9 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2016-6816

около 9 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2016-6816

почти 9 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2016-6816

почти 9 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0 ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-w3j5-q8f2-3cqq

больше 3 лет назад

Concurrent Execution using Shared Resource with Improper Synchronization in Apache Tomcat

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jc7p-5r39-9477

больше 3 лет назад

Improper Input Validation in Apache Tomcat

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:1292-1

больше 8 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1382-1

больше 8 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1229-1

больше 8 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:3144-1

около 9 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:3129-1

около 9 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:3081-1

около 9 лет назад

Security update for tomcat

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2017-0935

ELSA-2017-0935: tomcat security update (MODERATE)

почти 9 лет назад
oracle-oval логотип
ELSA-2017-0527

ELSA-2017-0527: tomcat6 security update (MODERATE)

почти 9 лет назад
suse-cvrf логотип
SUSE-SU-2017:1632-1

Security update for tomcat6

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1660-1

Security update for tomcat

больше 8 лет назад
ubuntu логотип
CVE-2016-8745

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
2%
Низкий
больше 8 лет назад
redhat логотип
CVE-2016-8745

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
2%
Низкий
около 9 лет назад
nvd логотип
CVE-2016-8745

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
2%
Низкий
больше 8 лет назад
debian логотип
CVE-2016-8745

A bug in the error handling of the send file code for the NIO HTTP con ...

CVSS3: 7.5
2%
Низкий
больше 8 лет назад
ubuntu логотип
CVE-2016-6816

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
4%
Низкий
почти 9 лет назад
redhat логотип
CVE-2016-6816

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 6.5
4%
Низкий
около 9 лет назад
nvd логотип
CVE-2016-6816

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
4%
Низкий
почти 9 лет назад
debian логотип
CVE-2016-6816

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0 ...

CVSS3: 7.1
4%
Низкий
почти 9 лет назад
github логотип
GHSA-w3j5-q8f2-3cqq

Concurrent Execution using Shared Resource with Improper Synchronization in Apache Tomcat

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
github логотип
GHSA-jc7p-5r39-9477

Improper Input Validation in Apache Tomcat

CVSS3: 7.1
4%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2017:1292-1

Security update for tomcat

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1382-1

Security update for tomcat

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1229-1

Security update for tomcat

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2016:3144-1

Security update for tomcat

около 9 лет назад
suse-cvrf логотип
openSUSE-SU-2016:3129-1

Security update for tomcat

около 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:3081-1

Security update for tomcat

около 9 лет назад

Уязвимостей на страницу