Логотип exploitDog
bind:"GHSA-pjfr-qf3p-3q25" OR bind:"CVE-2017-12615"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-pjfr-qf3p-3q25" OR bind:"CVE-2017-12615"

Количество 8

Количество 8

github логотип

GHSA-pjfr-qf3p-3q25

больше 6 лет назад

When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server

CVSS3: 8.1
EPSS: Критический
ubuntu логотип

CVE-2017-12615

почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
redhat логотип

CVE-2017-12615

почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
nvd логотип

CVE-2017-12615

почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
EPSS: Критический
debian логотип

CVE-2017-12615

почти 8 лет назад

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs e ...

CVSS3: 8.1
EPSS: Критический
oracle-oval логотип

ELSA-2017-3081

больше 7 лет назад

ELSA-2017-3081: tomcat security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3080

больше 7 лет назад

ELSA-2017-3080: tomcat6 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:3059-1

больше 7 лет назад

Security update for tomcat

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-pjfr-qf3p-3q25

When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server

CVSS3: 8.1
94%
Критический
больше 6 лет назад
ubuntu логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
почти 8 лет назад
redhat логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
почти 8 лет назад
nvd логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

CVSS3: 8.1
94%
Критический
почти 8 лет назад
debian логотип
CVE-2017-12615

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs e ...

CVSS3: 8.1
94%
Критический
почти 8 лет назад
oracle-oval логотип
ELSA-2017-3081

ELSA-2017-3081: tomcat security update (IMPORTANT)

больше 7 лет назад
oracle-oval логотип
ELSA-2017-3080

ELSA-2017-3080: tomcat6 security update (IMPORTANT)

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2017:3059-1

Security update for tomcat

больше 7 лет назад

Уязвимостей на страницу