Логотип exploitDog
bind:"CVE-2018-11784" OR bind:"CVE-2018-8014" OR bind:"CVE-2018-8034" OR bind:"CVE-2018-8037"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-11784" OR bind:"CVE-2018-8014" OR bind:"CVE-2018-8034" OR bind:"CVE-2018-8037"

Количество 43

Количество 43

fstec логотип

BDU:2019-01767

больше 6 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с использованием открытой переадресации, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 4.3
EPSS: Высокий
oracle-oval логотип

ELSA-2019-2205

почти 6 лет назад

ELSA-2019-2205: tomcat security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2018-8014

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
EPSS: Средний
redhat логотип

CVE-2018-8014

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 5.7
EPSS: Средний
nvd логотип

CVE-2018-8014

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2018-8014

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9. ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-r4x2-3cq5-hqvp

больше 6 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2019-00094

около 7 лет назад

Уязвимость компонента CORS контейнера сервлетов Apache Tomcat, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 9.8
EPSS: Средний
ubuntu логотип

CVE-2018-8037

почти 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-8037

почти 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 9.1
EPSS: Низкий
nvd логотип

CVE-2018-8037

почти 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-8037

почти 7 лет назад

If an async request was completed by the application at the same time ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-8034

почти 7 лет назад

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2018-8034

почти 7 лет назад

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 4.3
EPSS: Средний
nvd логотип

CVE-2018-8034

почти 7 лет назад

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2018-8034

почти 7 лет назад

The host name verification when using TLS with the WebSocket client wa ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-6v52-mj5r-7j2m

больше 6 лет назад

Apache Tomcat Race Condition vulnerability

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2019-04412

почти 7 лет назад

Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-46j3-r4pj-4835

больше 6 лет назад

The host name verification missing in Apache Tomcat

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2019-03108

почти 7 лет назад

Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-01767

Уязвимость сервера приложений Apache Tomcat, связанная с использованием открытой переадресации, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 4.3
88%
Высокий
больше 6 лет назад
oracle-oval логотип
ELSA-2019-2205

ELSA-2019-2205: tomcat security, bug fix, and enhancement update (MODERATE)

почти 6 лет назад
ubuntu логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
64%
Средний
около 7 лет назад
redhat логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 5.7
64%
Средний
около 7 лет назад
nvd логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
64%
Средний
около 7 лет назад
debian логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9. ...

CVSS3: 9.8
64%
Средний
около 7 лет назад
github логотип
GHSA-r4x2-3cq5-hqvp

The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins

CVSS3: 9.8
64%
Средний
больше 6 лет назад
fstec логотип
BDU:2019-00094

Уязвимость компонента CORS контейнера сервлетов Apache Tomcat, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 9.8
64%
Средний
около 7 лет назад
ubuntu логотип
CVE-2018-8037

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
5%
Низкий
почти 7 лет назад
redhat логотип
CVE-2018-8037

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 9.1
5%
Низкий
почти 7 лет назад
nvd логотип
CVE-2018-8037

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
5%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-8037

If an async request was completed by the application at the same time ...

CVSS3: 5.9
5%
Низкий
почти 7 лет назад
ubuntu логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
14%
Средний
почти 7 лет назад
redhat логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 4.3
14%
Средний
почти 7 лет назад
nvd логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
14%
Средний
почти 7 лет назад
debian логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client wa ...

CVSS3: 7.5
14%
Средний
почти 7 лет назад
github логотип
GHSA-6v52-mj5r-7j2m

Apache Tomcat Race Condition vulnerability

CVSS3: 5.9
5%
Низкий
больше 6 лет назад
fstec логотип
BDU:2019-04412

Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.9
5%
Низкий
почти 7 лет назад
github логотип
GHSA-46j3-r4pj-4835

The host name verification missing in Apache Tomcat

CVSS3: 7.5
14%
Средний
больше 6 лет назад
fstec логотип
BDU:2019-03108

Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 7.5
14%
Средний
почти 7 лет назад

Уязвимостей на страницу