CVE-2016-6794
- EPSS 0.36%
- Veröffentlicht 10.08.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the ...
CVE-2017-5664
- EPSS 10.84%
- Veröffentlicht 06.06.2017 14:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request...
CVE-2017-5647
- EPSS 4.15%
- Veröffentlicht 17.04.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file pr...
CVE-2017-5648
- EPSS 24.41%
- Veröffentlicht 17.04.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrus...
CVE-2017-5650
- EPSS 20.69%
- Veröffentlicht 17.04.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application ...
CVE-2017-5651
- EPSS 8.48%
- Veröffentlicht 17.04.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to th...
CVE-2016-8735
- EPSS 93.67%
- Veröffentlicht 06.04.2017 21:59:00
- Zuletzt bearbeitet 22.10.2025 00:15:56
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because...
CVE-2016-9774
- EPSS 0.07%
- Veröffentlicht 23.03.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 on Debian wheezy, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u8 on Debian wheezy, before 7.0.56-3+deb8u6 on Debi...
CVE-2016-9775
- EPSS 0.11%
- Veröffentlicht 23.03.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 on Debian wheezy, before 6.0.45+dfsg-1~deb8u1 on Debian jessie, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u7 on D...
CVE-2016-6816
- EPSS 2.78%
- Veröffentlicht 20.03.2017 18:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also ...