Логотип exploitDog
bind:"CVE-2020-13943"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-13943"

Количество 11

Количество 11

ubuntu логотип

CVE-2020-13943

почти 5 лет назад

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-13943

почти 5 лет назад

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-13943

почти 5 лет назад

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2020-13943

почти 5 лет назад

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7 ...

CVSS3: 4.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1842-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1799-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3069-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3068-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2996-1

почти 5 лет назад

Security update for tomcat

EPSS: Низкий
github логотип

GHSA-f268-65qc-98vg

больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

CVSS3: 4.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0040-1

больше 4 лет назад

Security update for tomcat

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 4.3
10%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 5.3
10%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS3: 4.3
10%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7 ...

CVSS3: 4.3
10%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1842-1

Security update for tomcat

10%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1799-1

Security update for tomcat

10%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3069-1

Security update for tomcat

10%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3068-1

Security update for tomcat

10%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2996-1

Security update for tomcat

10%
Низкий
почти 5 лет назад
github логотип
GHSA-f268-65qc-98vg

Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat

CVSS3: 4.3
10%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:0040-1

Security update for tomcat

больше 4 лет назад

Уязвимостей на страницу