- EPSS 2.88%
- Published 17.11.2012 19:55:02
- Last modified 11.04.2025 00:51:21
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce)...
- EPSS 0.73%
- Published 17.11.2012 19:55:02
- Last modified 11.04.2025 00:51:21
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers t...
- EPSS 2.22%
- Published 17.11.2012 19:55:02
- Last modified 11.04.2025 00:51:21
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it e...
- EPSS 12.34%
- Published 16.11.2012 21:55:01
- Last modified 11.04.2025 00:51:21
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of servic...
- EPSS 2.02%
- Published 19.01.2012 04:01:16
- Last modified 11.04.2025 00:51:21
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header infor...
- EPSS 22.97%
- Published 19.01.2012 04:01:16
- Last modified 11.04.2025 00:51:21
Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters...
- EPSS 5.27%
- Published 14.01.2012 21:55:00
- Last modified 11.04.2025 00:51:21
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypas...
- EPSS 2.97%
- Published 14.01.2012 21:55:00
- Last modified 11.04.2025 00:51:21
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via...
CVE-2011-5063
- EPSS 1.96%
- Published 14.01.2012 21:55:00
- Last modified 11.04.2025 00:51:21
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging t...
CVE-2011-5064
- EPSS 5.32%
- Published 14.01.2012 21:55:00
- Last modified 11.04.2025 00:51:21
DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for...