Количество 1 263
Количество 1 263
GHSA-975h-h4pp-737q
The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
GHSA-9737-qmgc-hfr9
Directory Traversal in Apache Tomcat
GHSA-8wch-9gcg-v2pr
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat
GHSA-8vmx-qmch-mpqg
Apache Tomcat OS Command Injection vulnerability
GHSA-8v5p-2cpv-c2x6
Apache Tomcat Source Code Disclosure
GHSA-8qq4-8jvq-mfw4
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
GHSA-8h2q-qm9x-55jc
Denial of Service in Apache Tomcat
GHSA-8g4f-fh7f-4fwh
Apache Tomcat Default Installation Reveals Sensitive Information
GHSA-8f4w-jwqv-5cxc
Apache Tomcat Vulnerable to Denial of Service (DoS) via Simultaneous Requests
GHSA-8c5c-v572-37xf
The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the tomcat6 and libtomcat6-java packages before 6.0.35-1ubuntu3.8 on Ubuntu 12.04 LTS, the tomcat7 and libtomcat7-java packages before 7.0.52-1ubuntu0.7 on Ubuntu 14.04 LTS, and tomcat8 and libtomcat8-java packages before 8.0.32-1ubuntu1.2 on Ubuntu 16.04 LTS allows local users with access to the tomcat account to gain root privileges via a symlink attack on the Catalina log file, as demonstrated by /var/log/tomcat7/catalina.out.
GHSA-87w9-x2c3-hrjj
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
GHSA-86fp-jgwm-wgj5
Apache Tomcat XSS Vulnerability
GHSA-83qj-6fr2-vhqg
Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
GHSA-7wj2-48c4-2684
Apache Tomcat Denial of Service vulnerability in the Catalina package
GHSA-7w75-32cg-r6g2
Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests
GHSA-7g59-hm8v-cwmc
Apache Tomcat information disclosure vulnerability
GHSA-79m3-w93m-vjpg
** DISPUTED ** Apache Tomcat 7.x uses world-readable permissions for the log directory and its files, which might allow local users to obtain sensitive information by reading a file. NOTE: One Tomcat distributor has stated "The tomcat log directory does not contain any sensitive information."
GHSA-76vr-72mv-mf3q
Cross-Site Request Forgery in Apache Tomcat
GHSA-73rx-3f9r-x949
Insufficient Verification of Data Authenticity in Apache Tomcat
GHSA-72m4-92vp-gxfj
The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-975h-h4pp-737q The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges. | 87% Высокий | больше 3 лет назад | ||
GHSA-9737-qmgc-hfr9 Directory Traversal in Apache Tomcat | CVSS3: 5.3 | 61% Средний | больше 3 лет назад | |
GHSA-8wch-9gcg-v2pr Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat | 10% Средний | больше 3 лет назад | ||
GHSA-8vmx-qmch-mpqg Apache Tomcat OS Command Injection vulnerability | CVSS3: 8.1 | 94% Критический | больше 6 лет назад | |
GHSA-8v5p-2cpv-c2x6 Apache Tomcat Source Code Disclosure | 5% Низкий | больше 3 лет назад | ||
GHSA-8qq4-8jvq-mfw4 Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | CVSS3: 7.5 | 91% Критический | больше 3 лет назад | |
GHSA-8h2q-qm9x-55jc Denial of Service in Apache Tomcat | 23% Средний | больше 3 лет назад | ||
GHSA-8g4f-fh7f-4fwh Apache Tomcat Default Installation Reveals Sensitive Information | 32% Средний | больше 3 лет назад | ||
GHSA-8f4w-jwqv-5cxc Apache Tomcat Vulnerable to Denial of Service (DoS) via Simultaneous Requests | 21% Средний | больше 3 лет назад | ||
GHSA-8c5c-v572-37xf The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the tomcat6 and libtomcat6-java packages before 6.0.35-1ubuntu3.8 on Ubuntu 12.04 LTS, the tomcat7 and libtomcat7-java packages before 7.0.52-1ubuntu0.7 on Ubuntu 14.04 LTS, and tomcat8 and libtomcat8-java packages before 8.0.32-1ubuntu1.2 on Ubuntu 16.04 LTS allows local users with access to the tomcat account to gain root privileges via a symlink attack on the Catalina log file, as demonstrated by /var/log/tomcat7/catalina.out. | CVSS3: 7.8 | 19% Средний | больше 3 лет назад | |
GHSA-87w9-x2c3-hrjj Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | 0% Низкий | больше 3 лет назад | ||
GHSA-86fp-jgwm-wgj5 Apache Tomcat XSS Vulnerability | 48% Средний | больше 3 лет назад | ||
GHSA-83qj-6fr2-vhqg Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | CVSS3: 9.8 | 94% Критический | 9 месяцев назад | |
GHSA-7wj2-48c4-2684 Apache Tomcat Denial of Service vulnerability in the Catalina package | 20% Средний | больше 3 лет назад | ||
GHSA-7w75-32cg-r6g2 Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests | CVSS3: 7.5 | 47% Средний | почти 2 года назад | |
GHSA-7g59-hm8v-cwmc Apache Tomcat information disclosure vulnerability | 8% Низкий | больше 3 лет назад | ||
GHSA-79m3-w93m-vjpg ** DISPUTED ** Apache Tomcat 7.x uses world-readable permissions for the log directory and its files, which might allow local users to obtain sensitive information by reading a file. NOTE: One Tomcat distributor has stated "The tomcat log directory does not contain any sensitive information." | 0% Низкий | больше 3 лет назад | ||
GHSA-76vr-72mv-mf3q Cross-Site Request Forgery in Apache Tomcat | 10% Низкий | больше 3 лет назад | ||
GHSA-73rx-3f9r-x949 Insufficient Verification of Data Authenticity in Apache Tomcat | CVSS3: 4.3 | 5% Низкий | больше 3 лет назад | |
GHSA-72m4-92vp-gxfj The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory. | 3% Низкий | больше 3 лет назад |
Уязвимостей на страницу