Количество 43
Количество 43
GHSA-46j3-r4pj-4835
The host name verification missing in Apache Tomcat
BDU:2019-03108
Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности
CVE-2018-8037
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
CVE-2018-8037
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
CVE-2018-8037
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
CVE-2018-8037
If an async request was completed by the application at the same time ...
CVE-2018-11784
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
CVE-2018-11784
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
CVE-2018-11784
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
CVE-2018-11784
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, ...
GHSA-6v52-mj5r-7j2m
Apache Tomcat Race Condition vulnerability
BDU:2019-04412
Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию
openSUSE-SU-2018:4042-1
Security update for tomcat
openSUSE-SU-2018:3453-1
Security update for tomcat
SUSE-SU-2018:3968-1
Security update for tomcat
SUSE-SU-2018:3935-1
Security update for tomcat6
SUSE-SU-2018:3393-1
Security update for tomcat
GHSA-5q99-f34m-67gc
Apache Tomcat Open Redirect vulnerability
ELSA-2019-0485
ELSA-2019-0485: tomcat security update (MODERATE)
BDU:2019-01767
Уязвимость сервера приложений Apache Tomcat, связанная с использованием открытой переадресации, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-46j3-r4pj-4835 The host name verification missing in Apache Tomcat | CVSS3: 7.5 | 16% Средний | около 7 лет назад | |
BDU:2019-03108 Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности | CVSS3: 7.5 | 16% Средний | больше 7 лет назад | |
CVE-2018-8037 If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. | CVSS3: 5.9 | 6% Низкий | больше 7 лет назад | |
CVE-2018-8037 If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. | CVSS3: 9.1 | 6% Низкий | больше 7 лет назад | |
CVE-2018-8037 If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. | CVSS3: 5.9 | 6% Низкий | больше 7 лет назад | |
CVE-2018-8037 If an async request was completed by the application at the same time ... | CVSS3: 5.9 | 6% Низкий | больше 7 лет назад | |
CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | CVSS3: 4.3 | 83% Высокий | около 7 лет назад | |
CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | CVSS3: 5.3 | 83% Высокий | около 7 лет назад | |
CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | CVSS3: 4.3 | 83% Высокий | около 7 лет назад | |
CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, ... | CVSS3: 4.3 | 83% Высокий | около 7 лет назад | |
GHSA-6v52-mj5r-7j2m Apache Tomcat Race Condition vulnerability | CVSS3: 5.9 | 6% Низкий | около 7 лет назад | |
BDU:2019-04412 Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.9 | 6% Низкий | больше 7 лет назад | |
openSUSE-SU-2018:4042-1 Security update for tomcat | 83% Высокий | около 7 лет назад | ||
openSUSE-SU-2018:3453-1 Security update for tomcat | 83% Высокий | около 7 лет назад | ||
SUSE-SU-2018:3968-1 Security update for tomcat | 83% Высокий | около 7 лет назад | ||
SUSE-SU-2018:3935-1 Security update for tomcat6 | 83% Высокий | около 7 лет назад | ||
SUSE-SU-2018:3393-1 Security update for tomcat | 83% Высокий | около 7 лет назад | ||
GHSA-5q99-f34m-67gc Apache Tomcat Open Redirect vulnerability | CVSS3: 4.3 | 83% Высокий | около 7 лет назад | |
ELSA-2019-0485 ELSA-2019-0485: tomcat security update (MODERATE) | почти 7 лет назад | |||
BDU:2019-01767 Уязвимость сервера приложений Apache Tomcat, связанная с использованием открытой переадресации, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 4.3 | 83% Высокий | около 7 лет назад |
Уязвимостей на страницу