Логотип exploitDog
bind:"CVE-2018-1305" OR bind:"CVE-2018-8034" OR bind:"CVE-2018-1304" OR bind:"CVE-2018-8014"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-1305" OR bind:"CVE-2018-8034" OR bind:"CVE-2018-1304" OR bind:"CVE-2018-8014"

Количество 37

Количество 37

nvd логотип

CVE-2018-8034

почти 7 лет назад

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2018-8034

почти 7 лет назад

The host name verification when using TLS with the WebSocket client wa ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-46j3-r4pj-4835

больше 6 лет назад

The host name verification missing in Apache Tomcat

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2019-03108

почти 7 лет назад

Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2018-1304

больше 7 лет назад

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-1304

больше 7 лет назад

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2018-1304

больше 7 лет назад

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-1304

больше 7 лет назад

The URL pattern of "" (the empty string) which exactly maps to the con ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-8014

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
EPSS: Средний
redhat логотип

CVE-2018-8014

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 5.7
EPSS: Средний
nvd логотип

CVE-2018-8014

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2018-8014

около 7 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat 9. ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-6rxj-58jh-436r

больше 6 лет назад

Apache Tomcat unauthorized access vulnerability

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2019-01759

больше 7 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с ошибками в настройках безопасности, позволяющая нарушителю получить доступ к ресурсам веб-приложений

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-r4x2-3cq5-hqvp

больше 6 лет назад

The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2019-00094

около 7 лет назад

Уязвимость компонента CORS контейнера сервлетов Apache Tomcat, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 9.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2018:1847-1

почти 7 лет назад

Security update for tomcat6

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.

CVSS3: 7.5
14%
Средний
почти 7 лет назад
debian логотип
CVE-2018-8034

The host name verification when using TLS with the WebSocket client wa ...

CVSS3: 7.5
14%
Средний
почти 7 лет назад
github логотип
GHSA-46j3-r4pj-4835

The host name verification missing in Apache Tomcat

CVSS3: 7.5
14%
Средний
больше 6 лет назад
fstec логотип
BDU:2019-03108

Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 7.5
14%
Средний
почти 7 лет назад
ubuntu логотип
CVE-2018-1304

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

CVSS3: 5.9
2%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-1304

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

CVSS3: 6.5
2%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-1304

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

CVSS3: 5.9
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-1304

The URL pattern of "" (the empty string) which exactly maps to the con ...

CVSS3: 5.9
2%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
64%
Средний
около 7 лет назад
redhat логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 5.7
64%
Средний
около 7 лет назад
nvd логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.

CVSS3: 9.8
64%
Средний
около 7 лет назад
debian логотип
CVE-2018-8014

The defaults settings for the CORS filter provided in Apache Tomcat 9. ...

CVSS3: 9.8
64%
Средний
около 7 лет назад
github логотип
GHSA-6rxj-58jh-436r

Apache Tomcat unauthorized access vulnerability

CVSS3: 5.9
2%
Низкий
больше 6 лет назад
fstec логотип
BDU:2019-01759

Уязвимость сервера приложений Apache Tomcat, связанная с ошибками в настройках безопасности, позволяющая нарушителю получить доступ к ресурсам веб-приложений

CVSS3: 5.9
2%
Низкий
больше 7 лет назад
github логотип
GHSA-r4x2-3cq5-hqvp

The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins

CVSS3: 9.8
64%
Средний
больше 6 лет назад
fstec логотип
BDU:2019-00094

Уязвимость компонента CORS контейнера сервлетов Apache Tomcat, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 9.8
64%
Средний
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1847-1

Security update for tomcat6

почти 7 лет назад

Уязвимостей на страницу