Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"

Количество 1 263

Количество 1 263

suse-cvrf логотип

openSUSE-SU-2018:3453-1

около 7 лет назад

Security update for tomcat

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2018:3968-1

около 7 лет назад

Security update for tomcat

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2018:3935-1

около 7 лет назад

Security update for tomcat6

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2018:3393-1

около 7 лет назад

Security update for tomcat

EPSS: Высокий
github логотип

GHSA-x59f-cpgf-vmmv

больше 3 лет назад

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts)....

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-wxcp-f2c8-x6xv

больше 3 лет назад

Observable Discrepancy in Apache Tomcat

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-pjfr-qf3p-3q25

около 7 лет назад

When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-5q99-f34m-67gc

около 7 лет назад

Apache Tomcat Open Redirect vulnerability

CVSS3: 4.3
EPSS: Высокий
github логотип

GHSA-4v3g-g84w-hv7r

больше 3 лет назад

Authentication Bypass Using an Alternate Path or Channel in Apache Tomcat

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-3mjp-p938-4329

больше 3 лет назад

Apache Tomcat vulnerable to SecurityManager bypass

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-2684

больше 6 лет назад

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts)....

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2019-2684

больше 6 лет назад

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts)....

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2019-2684

больше 6 лет назад

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CV

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2019-2684

больше 6 лет назад

Vulnerability in the Java SE, Java SE Embedded component of Oracle Jav ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-11784

около 7 лет назад

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVSS3: 4.3
EPSS: Высокий
redhat логотип

CVE-2018-11784

около 7 лет назад

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVSS3: 5.3
EPSS: Высокий
nvd логотип

CVE-2018-11784

около 7 лет назад

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVSS3: 4.3
EPSS: Высокий
debian логотип

CVE-2018-11784

около 7 лет назад

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, ...

CVSS3: 4.3
EPSS: Высокий
ubuntu логотип

CVE-2017-12615

больше 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
redhat логотип

CVE-2017-12615

больше 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
openSUSE-SU-2018:3453-1

Security update for tomcat

89%
Высокий
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3968-1

Security update for tomcat

89%
Высокий
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3935-1

Security update for tomcat6

89%
Высокий
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3393-1

Security update for tomcat

89%
Высокий
около 7 лет назад
github логотип
GHSA-x59f-cpgf-vmmv

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts)....

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
github логотип
GHSA-wxcp-f2c8-x6xv

Observable Discrepancy in Apache Tomcat

CVSS3: 5.9
1%
Низкий
больше 3 лет назад
github логотип
GHSA-pjfr-qf3p-3q25

When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server

CVSS3: 8.1
94%
Критический
около 7 лет назад
github логотип
GHSA-5q99-f34m-67gc

Apache Tomcat Open Redirect vulnerability

CVSS3: 4.3
89%
Высокий
около 7 лет назад
github логотип
GHSA-4v3g-g84w-hv7r

Authentication Bypass Using an Alternate Path or Channel in Apache Tomcat

CVSS3: 9.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-3mjp-p938-4329

Apache Tomcat vulnerable to SecurityManager bypass

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2019-2684

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts)....

CVSS3: 5.9
1%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-2684

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts)....

CVSS3: 5.9
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-2684

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CV

CVSS3: 5.9
1%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-2684

Vulnerability in the Java SE, Java SE Embedded component of Oracle Jav ...

CVSS3: 5.9
1%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2018-11784

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVSS3: 4.3
89%
Высокий
около 7 лет назад
redhat логотип
CVE-2018-11784

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVSS3: 5.3
89%
Высокий
около 7 лет назад
nvd логотип
CVE-2018-11784

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVSS3: 4.3
89%
Высокий
около 7 лет назад
debian логотип
CVE-2018-11784

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, ...

CVSS3: 4.3
89%
Высокий
около 7 лет назад
ubuntu логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
больше 8 лет назад
redhat логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
больше 8 лет назад

Уязвимостей на страницу