Apache

Tomcat

231 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 7.6%
  • Published 26.02.2009 23:30:00
  • Last modified 09.04.2025 00:30:58

The doRead method in Apache Tomcat 4.1.32 through 4.1.34 and 5.5.10 through 5.5.20 does not return a -1 to indicate when a certain error condition has occurred, which can cause Tomcat to send POST content from one request to a different request.

  • EPSS 4.3%
  • Published 13.10.2008 20:00:02
  • Last modified 09.04.2025 00:30:58

Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an insta...

  • EPSS 92.26%
  • Published 13.08.2008 00:41:00
  • Last modified 09.04.2025 00:30:58

Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequence...

Exploit
  • EPSS 38.15%
  • Published 04.08.2008 01:41:00
  • Last modified 09.04.2025 00:30:58

Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to...

Exploit
  • EPSS 88.99%
  • Published 04.08.2008 01:41:00
  • Last modified 09.04.2025 00:30:58

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traver...

  • EPSS 49.11%
  • Published 04.06.2008 19:32:00
  • Last modified 09.04.2025 00:30:58

Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.

Exploit
  • EPSS 81.6%
  • Published 12.02.2008 01:00:00
  • Last modified 09.04.2025 00:30:58

Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as se...

  • EPSS 11.87%
  • Published 12.02.2008 01:00:00
  • Last modified 09.04.2025 00:30:58

Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recen...

  • EPSS 4.1%
  • Published 12.02.2008 01:00:00
  • Last modified 09.04.2025 00:30:58

Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting dur...

  • EPSS 3.86%
  • Published 23.01.2008 02:00:00
  • Last modified 09.04.2025 00:30:58

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it e...