Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"

Количество 1 263

Количество 1 263

suse-cvrf логотип

SUSE-SU-2021:1431-1

больше 4 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0042-1

почти 5 лет назад

Security update for tomcat

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2021:0041-1

почти 5 лет назад

Security update for tomcat

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2021:0031-1

почти 5 лет назад

Security update for tomcat

EPSS: Средний
github логотип

GHSA-vvw4-rfwf-p6hx

почти 4 года назад

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-vf77-8h7g-gghp

почти 4 года назад

Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-jgwr-3qm3-26f3

больше 4 лет назад

Potential remote code execution in Apache Tomcat

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-j39c-c8hj-x4j3

больше 4 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2021-25329

почти 5 лет назад

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2021-25329

почти 5 лет назад

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2021-25329

почти 5 лет назад

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2021-25329

почти 5 лет назад

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10. ...

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2021-25122

почти 5 лет назад

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2021-25122

почти 5 лет назад

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2021-25122

почти 5 лет назад

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-25122

почти 5 лет назад

When responding to new h2c connection requests, Apache Tomcat versions ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2020-17527

около 5 лет назад

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2020-17527

около 5 лет назад

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2020-17527

около 5 лет назад

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2020-17527

около 5 лет назад

While investigating bug 64830 it was discovered that Apache Tomcat 10. ...

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2021:1431-1

Security update for tomcat

1%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0042-1

Security update for tomcat

11%
Средний
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0041-1

Security update for tomcat

11%
Средний
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0031-1

Security update for tomcat

11%
Средний
почти 5 лет назад
github логотип
GHSA-vvw4-rfwf-p6hx

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

CVSS3: 7.5
11%
Средний
почти 4 года назад
github логотип
GHSA-vf77-8h7g-gghp

Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat

CVSS3: 7.5
23%
Средний
почти 4 года назад
github логотип
GHSA-jgwr-3qm3-26f3

Potential remote code execution in Apache Tomcat

CVSS3: 7
1%
Низкий
больше 4 лет назад
github логотип
GHSA-j39c-c8hj-x4j3

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

CVSS3: 7.5
3%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2021-25329

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.

CVSS3: 7
1%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-25329

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.

CVSS3: 7
1%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-25329

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.

CVSS3: 7
1%
Низкий
почти 5 лет назад
debian логотип
CVE-2021-25329

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10. ...

CVSS3: 7
1%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2021-25122

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.

CVSS3: 7.5
3%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-25122

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.

CVSS3: 7.5
3%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-25122

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.

CVSS3: 7.5
3%
Низкий
почти 5 лет назад
debian логотип
CVE-2021-25122

When responding to new h2c connection requests, Apache Tomcat versions ...

CVSS3: 7.5
3%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
11%
Средний
около 5 лет назад
redhat логотип
CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
11%
Средний
около 5 лет назад
nvd логотип
CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

CVSS3: 7.5
11%
Средний
около 5 лет назад
debian логотип
CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10. ...

CVSS3: 7.5
11%
Средний
около 5 лет назад

Уязвимостей на страницу