Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"

Количество 1 263

Количество 1 263

github логотип

GHSA-975h-h4pp-737q

больше 3 лет назад

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

EPSS: Высокий
github логотип

GHSA-9737-qmgc-hfr9

больше 3 лет назад

Directory Traversal in Apache Tomcat

CVSS3: 5.3
EPSS: Средний
github логотип

GHSA-8wch-9gcg-v2pr

больше 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat

EPSS: Средний
github логотип

GHSA-8vmx-qmch-mpqg

больше 6 лет назад

Apache Tomcat OS Command Injection vulnerability

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-8v5p-2cpv-c2x6

больше 3 лет назад

Apache Tomcat Source Code Disclosure

EPSS: Низкий
github логотип

GHSA-8qq4-8jvq-mfw4

больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-8h2q-qm9x-55jc

больше 3 лет назад

Denial of Service in Apache Tomcat

EPSS: Средний
github логотип

GHSA-8g4f-fh7f-4fwh

больше 3 лет назад

Apache Tomcat Default Installation Reveals Sensitive Information

EPSS: Средний
github логотип

GHSA-8f4w-jwqv-5cxc

больше 3 лет назад

Apache Tomcat Vulnerable to Denial of Service (DoS) via Simultaneous Requests

EPSS: Средний
github логотип

GHSA-8c5c-v572-37xf

больше 3 лет назад

The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the tomcat6 and libtomcat6-java packages before 6.0.35-1ubuntu3.8 on Ubuntu 12.04 LTS, the tomcat7 and libtomcat7-java packages before 7.0.52-1ubuntu0.7 on Ubuntu 14.04 LTS, and tomcat8 and libtomcat8-java packages before 8.0.32-1ubuntu1.2 on Ubuntu 16.04 LTS allows local users with access to the tomcat account to gain root privileges via a symlink attack on the Catalina log file, as demonstrated by /var/log/tomcat7/catalina.out.

CVSS3: 7.8
EPSS: Средний
github логотип

GHSA-87w9-x2c3-hrjj

больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

EPSS: Низкий
github логотип

GHSA-86fp-jgwm-wgj5

больше 3 лет назад

Apache Tomcat XSS Vulnerability

EPSS: Средний
github логотип

GHSA-83qj-6fr2-vhqg

9 месяцев назад

Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-7wj2-48c4-2684

больше 3 лет назад

Apache Tomcat Denial of Service vulnerability in the Catalina package

EPSS: Средний
github логотип

GHSA-7w75-32cg-r6g2

почти 2 года назад

Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-7g59-hm8v-cwmc

больше 3 лет назад

Apache Tomcat information disclosure vulnerability

EPSS: Низкий
github логотип

GHSA-79m3-w93m-vjpg

больше 3 лет назад

** DISPUTED ** Apache Tomcat 7.x uses world-readable permissions for the log directory and its files, which might allow local users to obtain sensitive information by reading a file. NOTE: One Tomcat distributor has stated "The tomcat log directory does not contain any sensitive information."

EPSS: Низкий
github логотип

GHSA-76vr-72mv-mf3q

больше 3 лет назад

Cross-Site Request Forgery in Apache Tomcat

EPSS: Низкий
github логотип

GHSA-73rx-3f9r-x949

больше 3 лет назад

Insufficient Verification of Data Authenticity in Apache Tomcat

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-72m4-92vp-gxfj

больше 3 лет назад

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-975h-h4pp-737q

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

87%
Высокий
больше 3 лет назад
github логотип
GHSA-9737-qmgc-hfr9

Directory Traversal in Apache Tomcat

CVSS3: 5.3
61%
Средний
больше 3 лет назад
github логотип
GHSA-8wch-9gcg-v2pr

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat

10%
Средний
больше 3 лет назад
github логотип
GHSA-8vmx-qmch-mpqg

Apache Tomcat OS Command Injection vulnerability

CVSS3: 8.1
94%
Критический
больше 6 лет назад
github логотип
GHSA-8v5p-2cpv-c2x6

Apache Tomcat Source Code Disclosure

5%
Низкий
больше 3 лет назад
github логотип
GHSA-8qq4-8jvq-mfw4

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

CVSS3: 7.5
91%
Критический
больше 3 лет назад
github логотип
GHSA-8h2q-qm9x-55jc

Denial of Service in Apache Tomcat

23%
Средний
больше 3 лет назад
github логотип
GHSA-8g4f-fh7f-4fwh

Apache Tomcat Default Installation Reveals Sensitive Information

32%
Средний
больше 3 лет назад
github логотип
GHSA-8f4w-jwqv-5cxc

Apache Tomcat Vulnerable to Denial of Service (DoS) via Simultaneous Requests

21%
Средний
больше 3 лет назад
github логотип
GHSA-8c5c-v572-37xf

The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4 and tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the tomcat6 and libtomcat6-java packages before 6.0.35-1ubuntu3.8 on Ubuntu 12.04 LTS, the tomcat7 and libtomcat7-java packages before 7.0.52-1ubuntu0.7 on Ubuntu 14.04 LTS, and tomcat8 and libtomcat8-java packages before 8.0.32-1ubuntu1.2 on Ubuntu 16.04 LTS allows local users with access to the tomcat account to gain root privileges via a symlink attack on the Catalina log file, as demonstrated by /var/log/tomcat7/catalina.out.

CVSS3: 7.8
19%
Средний
больше 3 лет назад
github логотип
GHSA-87w9-x2c3-hrjj

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

0%
Низкий
больше 3 лет назад
github логотип
GHSA-86fp-jgwm-wgj5

Apache Tomcat XSS Vulnerability

48%
Средний
больше 3 лет назад
github логотип
GHSA-83qj-6fr2-vhqg

Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT

CVSS3: 9.8
94%
Критический
9 месяцев назад
github логотип
GHSA-7wj2-48c4-2684

Apache Tomcat Denial of Service vulnerability in the Catalina package

20%
Средний
больше 3 лет назад
github логотип
GHSA-7w75-32cg-r6g2

Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests

CVSS3: 7.5
47%
Средний
почти 2 года назад
github логотип
GHSA-7g59-hm8v-cwmc

Apache Tomcat information disclosure vulnerability

8%
Низкий
больше 3 лет назад
github логотип
GHSA-79m3-w93m-vjpg

** DISPUTED ** Apache Tomcat 7.x uses world-readable permissions for the log directory and its files, which might allow local users to obtain sensitive information by reading a file. NOTE: One Tomcat distributor has stated "The tomcat log directory does not contain any sensitive information."

0%
Низкий
больше 3 лет назад
github логотип
GHSA-76vr-72mv-mf3q

Cross-Site Request Forgery in Apache Tomcat

10%
Низкий
больше 3 лет назад
github логотип
GHSA-73rx-3f9r-x949

Insufficient Verification of Data Authenticity in Apache Tomcat

CVSS3: 4.3
5%
Низкий
больше 3 лет назад
github логотип
GHSA-72m4-92vp-gxfj

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.

3%
Низкий
больше 3 лет назад

Уязвимостей на страницу