Apache

Tomcat

235 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.05%
  • Veröffentlicht 19.12.2012 11:55:54
  • Zuletzt bearbeitet 11.04.2025 00:51:21

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then ...

  • EPSS 8.58%
  • Veröffentlicht 19.12.2012 11:55:54
  • Zuletzt bearbeitet 11.04.2025 00:51:21

org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.

Exploit
  • EPSS 31.07%
  • Veröffentlicht 19.12.2012 11:55:54
  • Zuletzt bearbeitet 11.04.2025 00:51:21

org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by termi...

Exploit
  • EPSS 13.83%
  • Veröffentlicht 30.11.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.

  • EPSS 3.01%
  • Veröffentlicht 17.11.2012 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce)...

  • EPSS 0.76%
  • Veröffentlicht 17.11.2012 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers t...

  • EPSS 1.2%
  • Veröffentlicht 17.11.2012 19:55:02
  • Zuletzt bearbeitet 30.10.2025 15:49:33

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it e...

  • EPSS 20.02%
  • Veröffentlicht 16.11.2012 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of servic...

  • EPSS 2.02%
  • Veröffentlicht 19.01.2012 04:01:16
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header infor...

  • EPSS 23.05%
  • Veröffentlicht 19.01.2012 04:01:16
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters...