Логотип exploitDog
bind:"CVE-2016-8745" OR bind:"CVE-2016-6816"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2016-8745" OR bind:"CVE-2016-6816"

Количество 21

Количество 21

oracle-oval логотип

ELSA-2017-0935

около 8 лет назад

ELSA-2017-0935: tomcat security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-0527

больше 8 лет назад

ELSA-2017-0527: tomcat6 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1632-1

почти 8 лет назад

Security update for tomcat6

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1660-1

почти 8 лет назад

Security update for tomcat

EPSS: Низкий
ubuntu логотип

CVE-2016-8745

почти 8 лет назад

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2016-8745

больше 8 лет назад

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2016-8745

почти 8 лет назад

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2016-8745

почти 8 лет назад

A bug in the error handling of the send file code for the NIO HTTP con ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2016-6816

около 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2016-6816

больше 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2016-6816

около 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2016-6816

около 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0 ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-w3j5-q8f2-3cqq

около 3 лет назад

Concurrent Execution using Shared Resource with Improper Synchronization in Apache Tomcat

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jc7p-5r39-9477

около 3 лет назад

Improper Input Validation in Apache Tomcat

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:1292-1

около 8 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1382-1

около 8 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1229-1

около 8 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:3144-1

больше 8 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:3129-1

больше 8 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:3081-1

больше 8 лет назад

Security update for tomcat

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2017-0935

ELSA-2017-0935: tomcat security update (MODERATE)

около 8 лет назад
oracle-oval логотип
ELSA-2017-0527

ELSA-2017-0527: tomcat6 security update (MODERATE)

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1632-1

Security update for tomcat6

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1660-1

Security update for tomcat

почти 8 лет назад
ubuntu логотип
CVE-2016-8745

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
9%
Низкий
почти 8 лет назад
redhat логотип
CVE-2016-8745

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
9%
Низкий
больше 8 лет назад
nvd логотип
CVE-2016-8745

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.

CVSS3: 7.5
9%
Низкий
почти 8 лет назад
debian логотип
CVE-2016-8745

A bug in the error handling of the send file code for the NIO HTTP con ...

CVSS3: 7.5
9%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2016-6816

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
3%
Низкий
около 8 лет назад
redhat логотип
CVE-2016-6816

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 6.5
3%
Низкий
больше 8 лет назад
nvd логотип
CVE-2016-6816

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
3%
Низкий
около 8 лет назад
debian логотип
CVE-2016-6816

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0 ...

CVSS3: 7.1
3%
Низкий
около 8 лет назад
github логотип
GHSA-w3j5-q8f2-3cqq

Concurrent Execution using Shared Resource with Improper Synchronization in Apache Tomcat

CVSS3: 7.5
9%
Низкий
около 3 лет назад
github логотип
GHSA-jc7p-5r39-9477

Improper Input Validation in Apache Tomcat

CVSS3: 7.1
3%
Низкий
около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2017:1292-1

Security update for tomcat

около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1382-1

Security update for tomcat

около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1229-1

Security update for tomcat

около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2016:3144-1

Security update for tomcat

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2016:3129-1

Security update for tomcat

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2016:3081-1

Security update for tomcat

больше 8 лет назад

Уязвимостей на страницу