Apache

Tomcat

235 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 19.01%
  • Veröffentlicht 17.04.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrus...

  • EPSS 18.6%
  • Veröffentlicht 17.04.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application ...

  • EPSS 5.57%
  • Veröffentlicht 17.04.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to th...

Warnung
  • EPSS 93.88%
  • Veröffentlicht 06.04.2017 21:59:00
  • Zuletzt bearbeitet 22.10.2025 00:15:56

Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because...

  • EPSS 0.07%
  • Veröffentlicht 23.03.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 on Debian wheezy, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u8 on Debian wheezy, before 7.0.56-3+deb8u6 on Debi...

  • EPSS 0.11%
  • Veröffentlicht 23.03.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 on Debian wheezy, before 6.0.45+dfsg-1~deb8u1 on Debian jessie, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u7 on D...

  • EPSS 2.36%
  • Veröffentlicht 20.03.2017 18:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also ...

  • EPSS 2.33%
  • Veröffentlicht 14.03.2017 09:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be associated with a different...

  • EPSS 0.1%
  • Veröffentlicht 13.10.2016 14:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging me...

Exploit
  • EPSS 14.47%
  • Veröffentlicht 13.10.2016 14:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging me...