Количество 1 133
Количество 1 133
GHSA-cpr9-82wf-f629
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
GHSA-cjg9-7x8h-6gw3
The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
GHSA-c78g-qwpw-2jgv
Improper Neutralization of Input During Web Page Generation in Apache Tomcat
GHSA-c57p-3v2g-w9rg
Insertion of Sensitive Information into Log File in Apache Tomcat
GHSA-c38m-v4m2-524v
Apache Tomcat Allows Remote Attackers to Spoof AJP Requests
GHSA-9xrj-439h-62hg
Improper Authentication in Apache Tomcat
GHSA-9hjv-9h75-xmpp
Improper Verification of Source of a Communication Channel in Apache Tomcat
GHSA-9hg2-395j-83rm
Expected Behavior Violation in Apache Tomcat
GHSA-9ggm-7897-x4mg
Improper Input Validation in Apache Tomcat
GHSA-99rf-92v6-cwx4
Improper Access Control in Apache Tomcat
GHSA-9785-w233-x6hv
Improper Resource Shutdown or Release in Apache Tomcat
GHSA-975h-h4pp-737q
The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
GHSA-9737-qmgc-hfr9
Directory Traversal in Apache Tomcat
GHSA-8wch-9gcg-v2pr
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat
GHSA-8vmx-qmch-mpqg
Apache Tomcat OS Command Injection vulnerability
GHSA-8v5p-2cpv-c2x6
Apache Tomcat Source Code Disclosure
GHSA-8qq4-8jvq-mfw4
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
GHSA-8h2q-qm9x-55jc
Denial of Service in Apache Tomcat
GHSA-8g4f-fh7f-4fwh
Apache Tomcat Default Installation Reveals Sensitive Information
GHSA-8f4w-jwqv-5cxc
Apache Tomcat Vulnerable to Denial of Service (DoS) via Simultaneous Requests
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-cpr9-82wf-f629 java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data. | 12% Средний | около 3 лет назад | ||
GHSA-cjg9-7x8h-6gw3 The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts. | 6% Низкий | больше 3 лет назад | ||
GHSA-c78g-qwpw-2jgv Improper Neutralization of Input During Web Page Generation in Apache Tomcat | 23% Средний | около 3 лет назад | ||
GHSA-c57p-3v2g-w9rg Insertion of Sensitive Information into Log File in Apache Tomcat | 0% Низкий | около 3 лет назад | ||
GHSA-c38m-v4m2-524v Apache Tomcat Allows Remote Attackers to Spoof AJP Requests | 1% Низкий | около 3 лет назад | ||
GHSA-9xrj-439h-62hg Improper Authentication in Apache Tomcat | 1% Низкий | около 3 лет назад | ||
GHSA-9hjv-9h75-xmpp Improper Verification of Source of a Communication Channel in Apache Tomcat | CVSS3: 6.3 | 0% Низкий | около 3 лет назад | |
GHSA-9hg2-395j-83rm Expected Behavior Violation in Apache Tomcat | CVSS3: 9.8 | 6% Низкий | около 3 лет назад | |
GHSA-9ggm-7897-x4mg Improper Input Validation in Apache Tomcat | 0% Низкий | около 3 лет назад | ||
GHSA-99rf-92v6-cwx4 Improper Access Control in Apache Tomcat | 3% Низкий | около 3 лет назад | ||
GHSA-9785-w233-x6hv Improper Resource Shutdown or Release in Apache Tomcat | CVSS3: 7.5 | 19% Средний | около 3 лет назад | |
GHSA-975h-h4pp-737q The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges. | 89% Высокий | больше 3 лет назад | ||
GHSA-9737-qmgc-hfr9 Directory Traversal in Apache Tomcat | CVSS3: 5.3 | 34% Средний | около 3 лет назад | |
GHSA-8wch-9gcg-v2pr Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat | 10% Средний | больше 3 лет назад | ||
GHSA-8vmx-qmch-mpqg Apache Tomcat OS Command Injection vulnerability | CVSS3: 8.1 | 94% Критический | больше 6 лет назад | |
GHSA-8v5p-2cpv-c2x6 Apache Tomcat Source Code Disclosure | 5% Низкий | больше 3 лет назад | ||
GHSA-8qq4-8jvq-mfw4 Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | CVSS3: 7.5 | 91% Критический | около 3 лет назад | |
GHSA-8h2q-qm9x-55jc Denial of Service in Apache Tomcat | 23% Средний | больше 3 лет назад | ||
GHSA-8g4f-fh7f-4fwh Apache Tomcat Default Installation Reveals Sensitive Information | 32% Средний | больше 3 лет назад | ||
GHSA-8f4w-jwqv-5cxc Apache Tomcat Vulnerable to Denial of Service (DoS) via Simultaneous Requests | 21% Средний | больше 3 лет назад |
Уязвимостей на страницу