Apache

Tomcat

235 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 9.14%
  • Veröffentlicht 14.01.2012 21:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypas...

  • EPSS 2.97%
  • Veröffentlicht 14.01.2012 21:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via...

  • EPSS 1.96%
  • Veröffentlicht 14.01.2012 21:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging t...

  • EPSS 5.32%
  • Veröffentlicht 14.01.2012 21:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for...

  • EPSS 72.16%
  • Veröffentlicht 05.01.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU con...

  • EPSS 0.3%
  • Veröffentlicht 11.11.2011 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

org/apache/catalina/core/DefaultInstanceManager.java in Apache Tomcat 7.x before 7.0.22 does not properly restrict ContainerServlets in the Manager application, which allows local users to gain privileges by using an untrusted web application to acce...

Exploit
  • EPSS 0.81%
  • Veröffentlicht 31.08.2011 23:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive in...

  • EPSS 8.78%
  • Veröffentlicht 15.08.2011 21:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows re...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 15.08.2011 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a cra...

  • EPSS 0.13%
  • Veröffentlicht 14.07.2011 23:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restri...