Логотип exploitDog
bind:"CVE-2017-12615" OR bind:"CVE-2017-12617" OR bind:"CVE-2017-7674" OR bind:"CVE-2017-5647"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-12615" OR bind:"CVE-2017-12617" OR bind:"CVE-2017-7674" OR bind:"CVE-2017-5647"

Количество 34

Количество 34

oracle-oval логотип

ELSA-2017-3081

больше 7 лет назад

ELSA-2017-3081: tomcat security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3080

больше 7 лет назад

ELSA-2017-3080: tomcat6 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:3059-1

больше 7 лет назад

Security update for tomcat

EPSS: Низкий
ubuntu логотип

CVE-2017-12615

почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
redhat логотип

CVE-2017-12615

почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
nvd логотип

CVE-2017-12615

почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
debian логотип

CVE-2017-12615

почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs e ...

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-pjfr-qf3p-3q25

больше 6 лет назад

When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server

CVSS3: 8.1
EPSS: Критический
suse-cvrf логотип

openSUSE-SU-2017:3069-1

больше 7 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:3279-1

больше 7 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:3039-1

больше 7 лет назад

Security update for tomcat

EPSS: Низкий
ubuntu логотип

CVE-2017-12617

больше 7 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
redhat логотип

CVE-2017-12617

больше 7 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
nvd логотип

CVE-2017-12617

больше 7 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
debian логотип

CVE-2017-12617

больше 7 лет назад

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22 ...

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-xjgh-84hx-56c5

около 3 лет назад

Unrestricted Upload of File with Dangerous Type Apache Tomcat

CVSS3: 8.1
EPSS: Критический
fstec логотип

BDU:2023-01045

больше 7 лет назад

Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием ограничений на загрузку файлов, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Критический
ubuntu логотип

CVE-2017-7674

почти 8 лет назад

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2017-7674

почти 8 лет назад

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2017-7674

почти 8 лет назад

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2017-3081

ELSA-2017-3081: tomcat security update (IMPORTANT)

больше 7 лет назад
oracle-oval логотип
ELSA-2017-3080

ELSA-2017-3080: tomcat6 security update (IMPORTANT)

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2017:3059-1

Security update for tomcat

больше 7 лет назад
ubuntu логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
почти 8 лет назад
redhat логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
почти 8 лет назад
nvd логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
почти 8 лет назад
debian логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs e ...

CVSS3: 8.1
94%
Критический
почти 8 лет назад
github логотип
GHSA-pjfr-qf3p-3q25

When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server

CVSS3: 8.1
94%
Критический
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2017:3069-1

Security update for tomcat

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2017:3279-1

Security update for tomcat

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2017:3039-1

Security update for tomcat

больше 7 лет назад
ubuntu логотип
CVE-2017-12617

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
больше 7 лет назад
redhat логотип
CVE-2017-12617

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
больше 7 лет назад
nvd логотип
CVE-2017-12617

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
больше 7 лет назад
debian логотип
CVE-2017-12617

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22 ...

CVSS3: 8.1
94%
Критический
больше 7 лет назад
github логотип
GHSA-xjgh-84hx-56c5

Unrestricted Upload of File with Dangerous Type Apache Tomcat

CVSS3: 8.1
94%
Критический
около 3 лет назад
fstec логотип
BDU:2023-01045

Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием ограничений на загрузку файлов, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
94%
Критический
больше 7 лет назад
ubuntu логотип
CVE-2017-7674

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

CVSS3: 4.3
5%
Низкий
почти 8 лет назад
redhat логотип
CVE-2017-7674

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

CVSS3: 5.9
5%
Низкий
почти 8 лет назад
nvd логотип
CVE-2017-7674

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

CVSS3: 4.3
5%
Низкий
почти 8 лет назад

Уязвимостей на страницу