Apache

Tomcat

238 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 20.28%
  • Veröffentlicht 16.11.2012 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of servic...

  • EPSS 2.02%
  • Veröffentlicht 19.01.2012 04:01:16
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header infor...

  • EPSS 23.42%
  • Veröffentlicht 19.01.2012 04:01:16
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters...

  • EPSS 2.24%
  • Veröffentlicht 14.01.2012 21:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypas...

  • EPSS 5.32%
  • Veröffentlicht 14.01.2012 21:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via...

  • EPSS 1.96%
  • Veröffentlicht 14.01.2012 21:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging t...

  • EPSS 5.32%
  • Veröffentlicht 14.01.2012 21:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for...

  • EPSS 76.6%
  • Veröffentlicht 05.01.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU con...

  • EPSS 0.3%
  • Veröffentlicht 11.11.2011 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

org/apache/catalina/core/DefaultInstanceManager.java in Apache Tomcat 7.x before 7.0.22 does not properly restrict ContainerServlets in the Manager application, which allows local users to gain privileges by using an untrusted web application to acce...

Exploit
  • EPSS 0.87%
  • Veröffentlicht 31.08.2011 23:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive in...