Логотип exploitDog
bind:"CVE-2018-11784" OR bind:"CVE-2018-8014" OR bind:"CVE-2018-8034" OR bind:"CVE-2018-8037"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-11784" OR bind:"CVE-2018-8014" OR bind:"CVE-2018-8034" OR bind:"CVE-2018-8037"

Количество 43

Количество 43

fstec логотип

BDU:2019-01767

около 7 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с использованием открытой переадресации, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 4.3
EPSS: Высокий
oracle-oval логотип

ELSA-2019-2205

около 6 лет назад

ELSA-2019-2205: tomcat security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2018-8014

больше 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
EPSS: Средний
redhat логотип

CVE-2018-8014

больше 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 5.7
EPSS: Средний
nvd логотип

CVE-2018-8014

больше 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2018-8014

больше 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9. ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-r4x2-3cq5-hqvp

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2019-00094

больше 7 лет назад

Уязвимость компонента CORS контейнера сервлетов Apache Tomcat, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 9.8
EPSS: Средний
ubuntu логотип

CVE-2018-8037

больше 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-8037

больше 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 9.1
EPSS: Низкий
nvd логотип

CVE-2018-8037

больше 7 лет назад

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-8037

больше 7 лет назад

If an async request was completed by the application at the same time ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-8034

больше 7 лет назад

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-8034

больше 7 лет назад

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2018-8034

больше 7 лет назад

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-8034

больше 7 лет назад

The host name verification when using TLS with the WebSocket client wa ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-6v52-mj5r-7j2m

около 7 лет назад

Apache Tomcat Race Condition vulnerability

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2019-04412

больше 7 лет назад

Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-46j3-r4pj-4835

около 7 лет назад

The host name verification missing in Apache Tomcat

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-03108

больше 7 лет назад

Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-01767

Уязвимость сервера приложений Apache Tomcat, связанная с использованием открытой переадресации, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 4.3
82%
Высокий
около 7 лет назад
oracle-oval логотип
ELSA-2019-2205

ELSA-2019-2205: tomcat security, bug fix, and enhancement update (MODERATE)

около 6 лет назад
ubuntu логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
22%
Средний
больше 7 лет назад
redhat логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 5.7
22%
Средний
больше 7 лет назад
nvd логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
22%
Средний
больше 7 лет назад
debian логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9. ...

CVSS3: 9.8
22%
Средний
больше 7 лет назад
github логотип
GHSA-r4x2-3cq5-hqvp

The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins

CVSS3: 9.8
22%
Средний
около 7 лет назад
fstec логотип
BDU:2019-00094

Уязвимость компонента CORS контейнера сервлетов Apache Tomcat, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 9.8
22%
Средний
больше 7 лет назад
ubuntu логотип
CVE-2018-8037

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
2%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-8037

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 9.1
2%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-8037

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVSS3: 5.9
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-8037

If an async request was completed by the application at the same time ...

CVSS3: 5.9
2%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
6%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 4.3
6%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
6%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client wa ...

CVSS3: 7.5
6%
Низкий
больше 7 лет назад
github логотип
GHSA-6v52-mj5r-7j2m

Apache Tomcat Race Condition vulnerability

CVSS3: 5.9
2%
Низкий
около 7 лет назад
fstec логотип
BDU:2019-04412

Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.9
2%
Низкий
больше 7 лет назад
github логотип
GHSA-46j3-r4pj-4835

The host name verification missing in Apache Tomcat

CVSS3: 7.5
6%
Низкий
около 7 лет назад
fstec логотип
BDU:2019-03108

Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 7.5
6%
Низкий
больше 7 лет назад

Уязвимостей на страницу