Apache

Tomcat

231 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 7.6%
  • Veröffentlicht 26.02.2009 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The doRead method in Apache Tomcat 4.1.32 through 4.1.34 and 5.5.10 through 5.5.20 does not return a -1 to indicate when a certain error condition has occurred, which can cause Tomcat to send POST content from one request to a different request.

  • EPSS 4.3%
  • Veröffentlicht 13.10.2008 20:00:02
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an insta...

  • EPSS 92.26%
  • Veröffentlicht 13.08.2008 00:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequence...

Exploit
  • EPSS 38.15%
  • Veröffentlicht 04.08.2008 01:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to...

Exploit
  • EPSS 88.99%
  • Veröffentlicht 04.08.2008 01:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traver...

  • EPSS 49.11%
  • Veröffentlicht 04.06.2008 19:32:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.

Exploit
  • EPSS 81.6%
  • Veröffentlicht 12.02.2008 01:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as se...

  • EPSS 11.87%
  • Veröffentlicht 12.02.2008 01:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recen...

  • EPSS 4.1%
  • Veröffentlicht 12.02.2008 01:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting dur...

  • EPSS 3.86%
  • Veröffentlicht 23.01.2008 02:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it e...