Количество 43
Количество 43
GHSA-46j3-r4pj-4835
The host name verification missing in Apache Tomcat

BDU:2019-03108
Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности

CVE-2018-8037
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVE-2018-8037
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

CVE-2018-8037
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
CVE-2018-8037
If an async request was completed by the application at the same time ...

CVE-2018-11784
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVE-2018-11784
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVE-2018-11784
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
CVE-2018-11784
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, ...
GHSA-6v52-mj5r-7j2m
Apache Tomcat Race Condition vulnerability

BDU:2019-04412
Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию

openSUSE-SU-2018:4042-1
Security update for tomcat

openSUSE-SU-2018:3453-1
Security update for tomcat

SUSE-SU-2018:3968-1
Security update for tomcat

SUSE-SU-2018:3935-1
Security update for tomcat6

SUSE-SU-2018:3393-1
Security update for tomcat
GHSA-5q99-f34m-67gc
Apache Tomcat Open Redirect vulnerability
ELSA-2019-0485
ELSA-2019-0485: tomcat security update (MODERATE)

BDU:2019-01767
Уязвимость сервера приложений Apache Tomcat, связанная с использованием открытой переадресации, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-46j3-r4pj-4835 The host name verification missing in Apache Tomcat | CVSS3: 7.5 | 13% Средний | почти 7 лет назад | |
![]() | BDU:2019-03108 Уязвимость компонента WebSocket client сервера приложений Apache Tomcat, связанная с ошибками при проверке имен хостов при использовании протокола Transport Layer Security (TLS), позволяющая нарушителю обойти существующие ограничения безопасности | CVSS3: 7.5 | 13% Средний | около 7 лет назад |
![]() | CVE-2018-8037 If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. | CVSS3: 5.9 | 6% Низкий | около 7 лет назад |
![]() | CVE-2018-8037 If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. | CVSS3: 9.1 | 6% Низкий | около 7 лет назад |
![]() | CVE-2018-8037 If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. | CVSS3: 5.9 | 6% Низкий | около 7 лет назад |
CVE-2018-8037 If an async request was completed by the application at the same time ... | CVSS3: 5.9 | 6% Низкий | около 7 лет назад | |
![]() | CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | CVSS3: 4.3 | 87% Высокий | почти 7 лет назад |
![]() | CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | CVSS3: 5.3 | 87% Высокий | почти 7 лет назад |
![]() | CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | CVSS3: 4.3 | 87% Высокий | почти 7 лет назад |
CVE-2018-11784 When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, ... | CVSS3: 4.3 | 87% Высокий | почти 7 лет назад | |
GHSA-6v52-mj5r-7j2m Apache Tomcat Race Condition vulnerability | CVSS3: 5.9 | 6% Низкий | почти 7 лет назад | |
![]() | BDU:2019-04412 Уязвимость сервера приложений Apache Tomcat, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.9 | 6% Низкий | около 7 лет назад |
![]() | openSUSE-SU-2018:4042-1 Security update for tomcat | 87% Высокий | больше 6 лет назад | |
![]() | openSUSE-SU-2018:3453-1 Security update for tomcat | 87% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:3968-1 Security update for tomcat | 87% Высокий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3935-1 Security update for tomcat6 | 87% Высокий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3393-1 Security update for tomcat | 87% Высокий | почти 7 лет назад | |
GHSA-5q99-f34m-67gc Apache Tomcat Open Redirect vulnerability | CVSS3: 4.3 | 87% Высокий | почти 7 лет назад | |
ELSA-2019-0485 ELSA-2019-0485: tomcat security update (MODERATE) | больше 6 лет назад | |||
![]() | BDU:2019-01767 Уязвимость сервера приложений Apache Tomcat, связанная с использованием открытой переадресации, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 4.3 | 87% Высокий | почти 7 лет назад |
Уязвимостей на страницу