CVE-2017-12615
- EPSS 94.2%
- Veröffentlicht 19.09.2017 13:29:00
- Zuletzt bearbeitet 22.10.2025 00:16:04
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP...
CVE-2017-12616
- EPSS 91.5%
- Veröffentlicht 19.09.2017 13:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
CVE-2016-6796
- EPSS 0.82%
- Veröffentlicht 11.08.2017 02:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for t...
CVE-2017-7674
- EPSS 5.92%
- Veröffentlicht 11.08.2017 02:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poi...
CVE-2017-7675
- EPSS 5.03%
- Veröffentlicht 11.08.2017 02:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted U...
CVE-2016-6797
- EPSS 0.56%
- Veröffentlicht 10.08.2017 22:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked ...
CVE-2016-6817
- EPSS 0.8%
- Veröffentlicht 10.08.2017 22:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
CVE-2016-8745
- EPSS 10.91%
- Veröffentlicht 10.08.2017 22:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the...
CVE-2016-0762
- EPSS 0.72%
- Veröffentlicht 10.08.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attac...
CVE-2016-5018
- EPSS 0.93%
- Veröffentlicht 10.08.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applica...