Количество 1 262
Количество 1 262
CVE-2008-5519
The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat al ...
CVE-2007-0450
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
CVE-2007-0450
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
CVE-2007-0450
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
CVE-2007-0450
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x ...
CVE-2005-3164
The AJP connector in Apache Tomcat 4.0.1 through 4.0.6 and 4.1.0 through 4.1.36, as used in Hitachi Cosminexus Application Server and standalone, does not properly handle when a connection is broken before request body data is sent in a POST request, which can lead to an information leak when "unsuitable request body data" is used for a different request, possibly related to Java Servlet pages.
CVE-2002-2272
Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 through 1.3.27, allows remote attackers to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values.
BDU:2025-08201
Уязвимость программного обеспечения Apache Tomcat, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю выполнить произвольный код
BDU:2023-04867
Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием защиты служебных данных. позволяющая нарушителю получить доступ к конфиденциальной информации
openSUSE-SU-2020:1842-1
Security update for tomcat
openSUSE-SU-2020:1799-1
Security update for tomcat
SUSE-SU-2020:3069-1
Security update for tomcat
SUSE-SU-2020:3068-1
Security update for tomcat
SUSE-SU-2020:2996-1
Security update for tomcat
GHSA-xx68-jfcg-xmmf
Commons FileUpload Denial of service vulnerability
GHSA-v6c7-8qx5-8gmp
Deserialization of Untrusted Data in Apache Tomcat
GHSA-m59c-jpc8-m2x4
In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder
GHSA-hh3j-x4mc-g48r
Insufficiently Protected Credentials in Apache Tomcat
GHSA-f268-65qc-98vg
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
GHSA-44qp-qhfv-c7f6
Improper Handling of Exceptional Conditions in Apache Tomcat
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2008-5519 The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat al ... | CVSS2: 2.6 | 5% Низкий | почти 17 лет назад | |
CVE-2007-0450 Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache. | CVSS2: 5 | 88% Высокий | почти 19 лет назад | |
CVE-2007-0450 Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache. | 88% Высокий | почти 19 лет назад | ||
CVE-2007-0450 Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache. | CVSS2: 5 | 88% Высокий | почти 19 лет назад | |
CVE-2007-0450 Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x ... | CVSS2: 5 | 88% Высокий | почти 19 лет назад | |
CVE-2005-3164 The AJP connector in Apache Tomcat 4.0.1 through 4.0.6 and 4.1.0 through 4.1.36, as used in Hitachi Cosminexus Application Server and standalone, does not properly handle when a connection is broken before request body data is sent in a POST request, which can lead to an information leak when "unsuitable request body data" is used for a different request, possibly related to Java Servlet pages. | CVSS2: 2.6 | 3% Низкий | больше 20 лет назад | |
CVE-2002-2272 Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 through 1.3.27, allows remote attackers to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values. | CVSS2: 7.8 | 23% Средний | около 23 лет назад | |
BDU:2025-08201 Уязвимость программного обеспечения Apache Tomcat, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.4 | 0% Низкий | 8 месяцев назад | |
BDU:2023-04867 Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием защиты служебных данных. позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
openSUSE-SU-2020:1842-1 Security update for tomcat | 10% Низкий | около 5 лет назад | ||
openSUSE-SU-2020:1799-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:3069-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:3068-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:2996-1 Security update for tomcat | 10% Низкий | больше 5 лет назад | ||
GHSA-xx68-jfcg-xmmf Commons FileUpload Denial of service vulnerability | 93% Критический | около 7 лет назад | ||
GHSA-v6c7-8qx5-8gmp Deserialization of Untrusted Data in Apache Tomcat | 5% Низкий | больше 3 лет назад | ||
GHSA-m59c-jpc8-m2x4 In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder | CVSS3: 7.5 | 15% Средний | больше 7 лет назад | |
GHSA-hh3j-x4mc-g48r Insufficiently Protected Credentials in Apache Tomcat | CVSS3: 7 | 0% Низкий | около 6 лет назад | |
GHSA-f268-65qc-98vg Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | CVSS3: 4.3 | 10% Низкий | почти 4 года назад | |
GHSA-44qp-qhfv-c7f6 Improper Handling of Exceptional Conditions in Apache Tomcat | CVSS3: 7.5 | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу