Apache

Tomcat

238 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 8.78%
  • Veröffentlicht 15.08.2011 21:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows re...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 15.08.2011 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a cra...

  • EPSS 0.13%
  • Veröffentlicht 14.07.2011 23:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restri...

  • EPSS 0.1%
  • Veröffentlicht 29.06.2011 17:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive inf...

  • EPSS 1.53%
  • Veröffentlicht 20.05.2011 22:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NO...

  • EPSS 0.79%
  • Veröffentlicht 08.04.2011 15:17:28
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerabi...

  • EPSS 11.7%
  • Veröffentlicht 08.04.2011 15:17:28
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP ...

  • EPSS 16.36%
  • Veröffentlicht 14.03.2011 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 7.x before 7.0.10 does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application.

  • EPSS 16.1%
  • Veröffentlicht 14.03.2011 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Apache Tomcat 7.x before 7.0.11, when web.xml has no security constraints, does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application. NOTE: this vulnerabi...

Exploit
  • EPSS 25.79%
  • Veröffentlicht 19.02.2011 01:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the displ...