Apache

Tomcat

231 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 79.49%
  • Published 31.05.2014 11:17:13
  • Last modified 12.04.2025 10:46:40

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource ...

  • EPSS 13.06%
  • Published 31.05.2014 11:17:13
  • Last modified 12.04.2025 10:46:40

java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a "Content-Length: 0" AJP request to trigger a hang in request processing.

  • EPSS 5.8%
  • Published 31.05.2014 11:17:13
  • Last modified 12.04.2025 10:46:40

java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager...

  • EPSS 70.61%
  • Published 31.05.2014 11:17:13
  • Last modified 12.04.2025 10:46:40

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a craf...

  • EPSS 7.06%
  • Published 31.05.2014 11:17:13
  • Last modified 12.04.2025 10:46:40

Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web a...

Exploit
  • EPSS 92.88%
  • Published 01.04.2014 06:27:51
  • Last modified 12.04.2025 10:46:40

MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that b...

  • EPSS 26.07%
  • Published 26.02.2014 14:55:08
  • Last modified 11.04.2025 00:51:21

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identifi...

  • EPSS 70.7%
  • Published 26.02.2014 14:55:08
  • Last modified 11.04.2025 00:51:21

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field...

  • EPSS 0.22%
  • Published 26.02.2014 14:55:08
  • Last modified 11.04.2025 00:51:21

Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML d...

  • EPSS 12.48%
  • Published 26.02.2014 14:55:08
  • Last modified 12.04.2025 10:46:40

org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a cra...