Apache

Tomcat

235 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.62%
  • Veröffentlicht 11.08.2017 02:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poi...

  • EPSS 4.17%
  • Veröffentlicht 11.08.2017 02:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted U...

  • EPSS 0.76%
  • Veröffentlicht 10.08.2017 22:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked ...

  • EPSS 0.37%
  • Veröffentlicht 10.08.2017 22:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.

  • EPSS 17.1%
  • Veröffentlicht 10.08.2017 22:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the...

  • EPSS 0.97%
  • Veröffentlicht 10.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attac...

Exploit
  • EPSS 1.31%
  • Veröffentlicht 10.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applica...

  • EPSS 0.49%
  • Veröffentlicht 10.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the ...

  • EPSS 10.8%
  • Veröffentlicht 06.06.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request...

  • EPSS 3.99%
  • Veröffentlicht 17.04.2017 16:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file pr...