Логотип exploitDog
bind:CVE-2011-3190
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-3190

Количество 6

Количество 6

ubuntu логотип

CVE-2011-3190

почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2011-3190

почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

CVSS2: 5.8
EPSS: Низкий
nvd логотип

CVE-2011-3190

почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2011-3190

почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-c38m-v4m2-524v

около 3 лет назад

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

EPSS: Низкий
oracle-oval логотип

ELSA-2011-1780

больше 13 лет назад

ELSA-2011-1780: tomcat6 security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-3190

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

CVSS2: 7.5
1%
Низкий
почти 14 лет назад
redhat логотип
CVE-2011-3190

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

CVSS2: 5.8
1%
Низкий
почти 14 лет назад
nvd логотип
CVE-2011-3190

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

CVSS2: 7.5
1%
Низкий
почти 14 лет назад
debian логотип
CVE-2011-3190

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 ...

CVSS2: 7.5
1%
Низкий
почти 14 лет назад
github логотип
GHSA-c38m-v4m2-524v

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

1%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2011-1780

ELSA-2011-1780: tomcat6 security and bug fix update (MODERATE)

больше 13 лет назад

Уязвимостей на страницу