Логотип exploitDog
product: "tomcat"
Консоль
Логотип exploitDog

exploitDog

product: "tomcat"

Количество 1 262

Количество 1 262

nvd логотип

CVE-2010-1157

почти 16 лет назад

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.

CVSS2: 2.6
EPSS: Средний
debian логотип

CVE-2010-1157

почти 16 лет назад

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allo ...

CVSS2: 2.6
EPSS: Средний
nvd логотип

CVE-2009-3548

около 16 лет назад

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

CVSS2: 7.5
EPSS: Высокий
debian логотип

CVE-2009-3548

около 16 лет назад

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 th ...

CVSS2: 7.5
EPSS: Высокий
ubuntu логотип

CVE-2009-2902

около 16 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

CVSS2: 4.3
EPSS: Средний
redhat логотип

CVE-2009-2902

около 16 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

CVSS2: 4.3
EPSS: Средний
nvd логотип

CVE-2009-2902

около 16 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

CVSS2: 4.3
EPSS: Средний
debian логотип

CVE-2009-2902

около 16 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.2 ...

CVSS2: 4.3
EPSS: Средний
ubuntu логотип

CVE-2009-2901

около 16 лет назад

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2009-2901

около 16 лет назад

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.

EPSS: Низкий
nvd логотип

CVE-2009-2901

около 16 лет назад

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2009-2901

около 16 лет назад

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6 ...

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2009-2696

больше 15 лет назад

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2009-2696

больше 15 лет назад

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

CVSS2: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2009-2693

около 16 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.

CVSS2: 5.8
EPSS: Средний
redhat логотип

CVE-2009-2693

около 16 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.

CVSS2: 4.3
EPSS: Средний
nvd логотип

CVE-2009-2693

около 16 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.

CVSS2: 5.8
EPSS: Средний
debian логотип

CVE-2009-2693

около 16 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.2 ...

CVSS2: 5.8
EPSS: Средний
ubuntu логотип

CVE-2009-0783

больше 16 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.

CVSS3: 4.2
EPSS: Низкий
redhat логотип

CVE-2009-0783

больше 16 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.

CVSS2: 1.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2010-1157

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.

CVSS2: 2.6
17%
Средний
почти 16 лет назад
debian логотип
CVE-2010-1157

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allo ...

CVSS2: 2.6
17%
Средний
почти 16 лет назад
nvd логотип
CVE-2009-3548

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.

CVSS2: 7.5
87%
Высокий
около 16 лет назад
debian логотип
CVE-2009-3548

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 th ...

CVSS2: 7.5
87%
Высокий
около 16 лет назад
ubuntu логотип
CVE-2009-2902

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

CVSS2: 4.3
10%
Средний
около 16 лет назад
redhat логотип
CVE-2009-2902

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

CVSS2: 4.3
10%
Средний
около 16 лет назад
nvd логотип
CVE-2009-2902

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

CVSS2: 4.3
10%
Средний
около 16 лет назад
debian логотип
CVE-2009-2902

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.2 ...

CVSS2: 4.3
10%
Средний
около 16 лет назад
ubuntu логотип
CVE-2009-2901

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.

CVSS2: 4.3
7%
Низкий
около 16 лет назад
redhat логотип
CVE-2009-2901

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.

7%
Низкий
около 16 лет назад
nvd логотип
CVE-2009-2901

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.

CVSS2: 4.3
7%
Низкий
около 16 лет назад
debian логотип
CVE-2009-2901

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6 ...

CVSS2: 4.3
7%
Низкий
около 16 лет назад
redhat логотип
CVE-2009-2696

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

CVSS2: 4.3
1%
Низкий
больше 15 лет назад
nvd логотип
CVE-2009-2696

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

CVSS2: 4.3
1%
Низкий
больше 15 лет назад
ubuntu логотип
CVE-2009-2693

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.

CVSS2: 5.8
15%
Средний
около 16 лет назад
redhat логотип
CVE-2009-2693

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.

CVSS2: 4.3
15%
Средний
около 16 лет назад
nvd логотип
CVE-2009-2693

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.

CVSS2: 5.8
15%
Средний
около 16 лет назад
debian логотип
CVE-2009-2693

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.2 ...

CVSS2: 5.8
15%
Средний
около 16 лет назад
ubuntu логотип
CVE-2009-0783

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.

CVSS3: 4.2
0%
Низкий
больше 16 лет назад
redhat логотип
CVE-2009-0783

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.

CVSS2: 1.5
0%
Низкий
больше 16 лет назад

Уязвимостей на страницу