Summary
Detail | |||
---|---|---|---|
Vendor | Apache | First view | 2000-07-20 |
Product | Tomcat | Last view | 2024-01-19 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2024-01-19 | CVE-2024-21733 | Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue. |
7.5 | 2023-11-28 | CVE-2023-46589 | Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11Ā onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. |
5.3 | 2023-10-10 | CVE-2023-45648 | Improper Input Validation vulnerability in Apache Tomcat.TomcatĀ from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue. |
7.5 | 2023-10-10 | CVE-2023-44487 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
5.3 | 2023-10-10 | CVE-2023-42795 | Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. |
5.9 | 2023-10-10 | CVE-2023-42794 | Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. |
6.1 | 2023-08-25 | CVE-2023-41080 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application. |
7.5 | 2023-06-21 | CVE-2023-34981 | A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. |
7.5 | 2023-05-22 | CVE-2023-28709 | The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCountĀ could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parametersĀ in the query string, the limit for uploaded request parts could beĀ bypassed with the potential for a denial of service to occur. |
4.3 | 2023-03-22 | CVE-2023-28708 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did notĀ include the secure attribute. This could result in the user agentĀ transmitting the session cookie over an insecure channel. |
7.5 | 2023-01-03 | CVE-2022-45143 | The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output. |
7.5 | 2022-11-01 | CVE-2022-42252 | If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. |
3.7 | 2022-09-28 | CVE-2021-43980 | The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client. |
6.1 | 2022-06-23 | CVE-2022-34305 | In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability. |
8.6 | 2022-05-13 | CVE-2022-25762 | If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors. |
7.5 | 2022-05-12 | CVE-2022-29885 | The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks. |
7 | 2022-01-27 | CVE-2022-23181 | The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore. |
7.5 | 2021-10-14 | CVE-2021-42340 | The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. |
7.5 | 2021-09-16 | CVE-2021-41079 | Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. |
5.3 | 2021-07-12 | CVE-2021-33037 | Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding. |
6.5 | 2021-07-12 | CVE-2021-30640 | A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. |
7.5 | 2021-07-12 | CVE-2021-30639 | A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64. |
7 | 2021-03-01 | CVE-2021-25329 | The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. |
7.5 | 2021-03-01 | CVE-2021-25122 | When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request. |
5.9 | 2021-01-14 | CVE-2021-24122 | When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
13% (20) | CWE-264 | Permissions, Privileges, and Access Controls |
13% (20) | CWE-200 | Information Exposure |
9% (14) | CWE-20 | Improper Input Validation |
8% (13) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
6% (10) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
3% (5) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
2% (4) | CWE-399 | Resource Management Errors |
2% (4) | CWE-287 | Improper Authentication |
2% (3) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (3) | CWE-352 | Cross-Site Request Forgery (CSRF) |
2% (3) | CWE-284 | Access Control (Authorization) Issues |
2% (3) | CWE-189 | Numeric Errors |
2% (3) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
1% (2) | CWE-755 | Improper Handling of Exceptional Conditions |
1% (2) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (2) | CWE-459 | Incomplete Cleanup |
1% (2) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (2) | CWE-404 | Improper Resource Shutdown or Release |
1% (2) | CWE-362 | Race Condition |
1% (2) | CWE-276 | Incorrect Default Permissions |
1% (2) | CWE-116 | Improper Encoding or Escaping of Output |
1% (2) | CWE-16 | Configuration |
0% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
0% (1) | CWE-706 | Use of Incorrectly-Resolved Name or Reference |
0% (1) | CWE-668 | Exposure of Resource to Wrong Sphere |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-33 | HTTP Request Smuggling |
CAPEC-102 | Session Sidejacking |
CAPEC-105 | HTTP Request Splitting |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:10499 | Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remo... |
oval:org.mitre.oval:def:10643 | Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before... |
oval:org.mitre.oval:def:22631 | ELSA-2007:0327: tomcat security update (Important) |
oval:org.mitre.oval:def:10514 | Cross-site scripting (XSS) vulnerability in implicit-objects.jsp in Apache To... |
oval:org.mitre.oval:def:10679 | Cross-site scripting (XSS) vulnerability in certain applications using Apache... |
oval:org.mitre.oval:def:6111 | HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (... |
oval:org.mitre.oval:def:10578 | Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in t... |
oval:org.mitre.oval:def:7601 | DSA-1468 tomcat5.5 -- several vulnerabilities |
oval:org.mitre.oval:def:20358 | DSA-1468-1 tomcat5.5 |
oval:org.mitre.oval:def:11287 | Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2... |
oval:org.mitre.oval:def:22687 | ELSA-2007:0569: tomcat security update (Moderate) |
oval:org.mitre.oval:def:11269 | Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1... |
oval:org.mitre.oval:def:9549 | Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1... |
oval:org.mitre.oval:def:10077 | Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apac... |
oval:org.mitre.oval:def:22357 | ELSA-2007:0871: tomcat security update (Moderate) |
oval:org.mitre.oval:def:9202 | Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4... |
oval:org.mitre.oval:def:7989 | DSA-1447 tomcat5.5 -- several vulnerabilities |
oval:org.mitre.oval:def:7988 | DSA-1453 tomcat5 -- several vulnerabilities |
oval:org.mitre.oval:def:18716 | DSA-1447-1 tomcat5.5 several vulnerabilities |
oval:org.mitre.oval:def:18430 | DSA-1453-1 tomcat5 - several vulnerabilities |
oval:org.mitre.oval:def:10417 | The default catalina.policy in the JULI logging component in Apache Tomcat 5.... |
oval:org.mitre.oval:def:21709 | ELSA-2008:0042: tomcat security update (Moderate) |
oval:org.mitre.oval:def:11177 | Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4... |
oval:org.mitre.oval:def:8361 | DSA-1593 tomcat5.5 -- missing input sanitising |
oval:org.mitre.oval:def:6009 | Security vulnerability in the Virtual Host Manager in Tomcat 5.5 bundled with... |
SAINT Exploits
Description | Link |
---|---|
Apache Tomcat PUT method JSP upload | More info here |
HP Performance Manager Apache Tomcat Policy Bypass | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
78573 | Apache Tomcat CPU Consumption Parameter Saturation Remote DoS |
78483 | Hitachi Cosminexus Multiple Product Hash Collission Form Parameter Parsing Re... |
78331 | Apache Tomcat Request Object Recycling Information Disclosure |
78113 | Apache Tomcat Hash Collission Form Parameter Parsing Remote DoS |
76944 | Apache Tomcat Manager Application Servlets Access Restriction Bypass |
76189 | Apache Tomcat HTTP DIGEST Authentication Weakness |
74818 | Apache Tomcat AJP Message Injection Authentication Bypass |
74541 | Apache Tomcat Commons Daemon Jsvc Permissions Weakness Arbitrary File Access |
74535 | Apache Tomcat XML Parser Cross-application Multiple File Manipulation |
73798 | Apache Tomcat sendfile Request Start / Endpoint Parsing Local DoS |
73797 | Apache Tomcat sendfile Request Attribute Validation Weakness Local Access Res... |
73776 | Apache Tomcat HTTP BIO Connector HTTP Pipelining Cross-user Remote Response A... |
73429 | Apache Tomcat JMX MemoryUserDatabase Local Password Disclosure |
72407 | Apache Tomcat @ServletSecurity Initial Load Annotation Security Constraint By... |
71558 | Apache Tomcat SecurityManager ServletContext Attribute Traversal Arbitrary Fi... |
71557 | Apache Tomcat HTML Manager Multiple XSS |
71027 | Apache Tomcat @ServletSecurity Annotation Security Constraint Bypass Informat... |
70809 | Apache Tomcat NIO HTTP Connector Request Line Processing DoS |
69512 | Apache Tomcat Set-Cookie Header HTTPOnly Flag Session Hijacking Weakness |
69456 | Apache Tomcat Manager manager/html/sessions Multiple Parameter XSS |
66319 | Apache Tomcat Crafted Transfer-Encoding Header Handling Buffer Recycling Remo... |
64023 | Apache Tomcat WWW-Authenticate Header Local Host Information Disclosure |
62511 | CA Service Desk Tomcat host-manager/html/add name Parameter XSS |
62054 | Apache Tomcat WAR Filename Traversal Work-directory File Deletion |
62053 | Apache Tomcat Autodeployment Process appBase File HTTP Request Authentication... |
ExploitDB Exploits
id | Description |
---|---|
31615 | Apache Commons FileUpload and Apache Tomcat Denial-of-Service |
31130 | Apache Tomcat <= 6.0.15 Cookie Quote Handling Remote Information Disclosur... |
29435 | Apache Tomcat 5.5.25 - CSRF Vulnerabilities |
18305 | PHP Hash Table Collision Proof Of Concept |
12343 | Apache Tomcat v. 5.5.0 to 5.5.29 & 6.0.0 to 6.0.26 information disclosure... |
10085 | ToutVirtual VirtualIQ Pro 3.2 Multiple Vulnerabilities |
6229 | Apache Tomcat < 6.0.18 UTF8 Directory Traversal Vulnerability |
OpenVAS Exploits
id | Description |
---|---|
2012-12-26 | Name : Fedora Update for tomcat FEDORA-2012-20151 File : nvt/gb_fedora_2012_20151_tomcat_fc16.nasl |
2012-12-05 | Name : Apache Tomcat Partial HTTP Requests DoS Vulnerability (Windows) File : nvt/gb_apache_tomcat_partial_http_req_dos_vuln_win.nasl |
2012-11-27 | Name : Apache Tomcat HTTP NIO Denial Of Service Vulnerability (Windows) File : nvt/gb_apache_tomcat_http_nio_connector_dos_vuln_win.nasl |
2012-11-27 | Name : Apache Tomcat Multiple Security Bypass Vulnerabilities (Windows) File : nvt/gb_apache_tomcat_mult_sec_bypass_vuln_win.nasl |
2012-11-26 | Name : FreeBSD Ports: tomcat File : nvt/freebsd_tomcat2.nasl |
2012-11-23 | Name : Ubuntu Update for tomcat6 USN-1637-1 File : nvt/gb_ubuntu_USN_1637_1.nasl |
2012-08-14 | Name : Fedora Update for tomcat6 FEDORA-2012-7593 File : nvt/gb_fedora_2012_7593_tomcat6_fc16.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-24 (apache tomcat) File : nvt/glsa_201206_24.nasl |
2012-08-03 | Name : Mandriva Update for tomcat5 MDVSA-2012:085 (tomcat5) File : nvt/gb_mandriva_MDVSA_2012_085.nasl |
2012-08-02 | Name : SuSE Update for tomcat6 openSUSE-SU-2012:0208-1 (tomcat6) File : nvt/gb_suse_2012_0208_1.nasl |
2012-07-30 | Name : CentOS Update for tomcat6 CESA-2011:1780 centos6 File : nvt/gb_CESA-2011_1780_tomcat6_centos6.nasl |
2012-07-30 | Name : CentOS Update for tomcat5 CESA-2011:1845 centos5 x86_64 File : nvt/gb_CESA-2011_1845_tomcat5_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for tomcat5 CESA-2012:0474 centos5 File : nvt/gb_CESA-2012_0474_tomcat5_centos5.nasl |
2012-07-30 | Name : CentOS Update for tomcat6 CESA-2012:0475 centos6 File : nvt/gb_CESA-2012_0475_tomcat6_centos6.nasl |
2012-07-09 | Name : RedHat Update for tomcat6 RHSA-2011:1780-01 File : nvt/gb_RHSA-2011_1780-01_tomcat6.nasl |
2012-07-09 | Name : RedHat Update for tomcat6 RHSA-2012:0475-01 File : nvt/gb_RHSA-2012_0475-01_tomcat6.nasl |
2012-06-06 | Name : RedHat Update for tomcat6 RHSA-2011:0335-01 File : nvt/gb_RHSA-2011_0335-01_tomcat6.nasl |
2012-06-06 | Name : RedHat Update for tomcat6 RHSA-2011:0791-01 File : nvt/gb_RHSA-2011_0791-01_tomcat6.nasl |
2012-04-13 | Name : RedHat Update for tomcat5 RHSA-2012:0474-01 File : nvt/gb_RHSA-2012_0474-01_tomcat5.nasl |
2012-04-02 | Name : Fedora Update for apache-commons-daemon FEDORA-2011-10880 File : nvt/gb_fedora_2011_10880_apache-commons-daemon_fc16.nasl |
2012-04-02 | Name : Fedora Update for tomcat6 FEDORA-2011-13426 File : nvt/gb_fedora_2011_13426_tomcat6_fc16.nasl |
2012-03-16 | Name : VMSA-2011-0003.2 Third party component updates for VMware vCenter Server, vCe... File : nvt/gb_VMSA-2011-0003.nasl |
2012-03-16 | Name : VMSA-2012-0005 VMware vCenter Server, Orchestrator, Update Manager, vShield, ... File : nvt/gb_VMSA-2012-0005.nasl |
2012-02-21 | Name : Ubuntu Update for tomcat6 USN-1359-1 File : nvt/gb_ubuntu_USN_1359_1.nasl |
2012-02-12 | Name : Debian Security Advisory DSA 2401-1 (tomcat6) File : nvt/deb_2401_1.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0160 | Multiple Vulnerabilities in Oracle Linux and Virtualization Severity: Category I - VMSKEY: V0061123 |
2015-B-0083 | Multiple Vulnerabilities in IBM Storwize V7000 Unified Severity: Category I - VMSKEY: V0060983 |
2015-B-0065 | Apache Tomcat Security Bypass Vulnerability Severity: Category I - VMSKEY: V0060761 |
2014-B-0090 | Multiple Vulnerabilities in VMware vCenter Operations Severity: Category I - VMSKEY: V0052895 |
2014-B-0063 | Multiple Vulnerabilities in Apache Tomcat Severity: Category I - VMSKEY: V0051613 |
2014-B-0065 | Multiple Vulnerabilities in IBM WebSphere Application Server Severity: Category I - VMSKEY: V0051617 |
2014-B-0019 | Multiple Vulnerabilities in Apache Tomcat Severity: Category I - VMSKEY: V0044527 |
2014-A-0009 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0043395 |
2013-A-0219 | Multiple Vulnerabilities in Juniper Networks and Security Manager Severity: Category I - VMSKEY: V0042384 |
2013-A-0177 | Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform Severity: Category I - VMSKEY: V0040288 |
2013-B-0047 | Multiple Vulnerabilities in Apache Tomcat Severity: Category I - VMSKEY: V0037947 |
2012-B-0048 | Multiple Vulnerabilities in HP Systems Insight Manager Severity: Category I - VMSKEY: V0032178 |
2011-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0027158 |
SnortĀ® IPS/IDS
Date | Description |
---|---|
2014-01-10 | .cmd? access RuleID : 9791 - Type : SERVER-WEBAPP - Revision : 8 |
2014-01-10 | .bat? access RuleID : 976-community - Type : SERVER-WEBAPP - Revision : 21 |
2014-01-10 | .bat? access RuleID : 976 - Type : SERVER-WEBAPP - Revision : 21 |
2020-11-24 | Apache Tomcat WebSocket length denial of service attempt RuleID : 56086 - Type : SERVER-WEBAPP - Revision : 1 |
2020-10-22 | Apache Tomcat HTTP/2 denial of service attempt RuleID : 55801 - Type : SERVER-WEBAPP - Revision : 1 |
2020-10-22 | Apache Tomcat HTTP/2 denial of service attempt RuleID : 55800 - Type : SERVER-WEBAPP - Revision : 1 |
2020-07-07 | Apache Tomcat FileStore directory traversal attempt RuleID : 54162 - Type : SERVER-WEBAPP - Revision : 1 |
2020-02-26 | Apache Tomcat AJP connector arbitrary file access attempt RuleID : 53341-community - Type : SERVER-APACHE - Revision : 2 |
2020-03-31 | Apache Tomcat AJP connector arbitrary file access attempt RuleID : 53341 - Type : SERVER-APACHE - Revision : 2 |
2020-01-16 | Apache Tomcat chunked transfer encoding denial of service attempt RuleID : 52471 - Type : SERVER-APACHE - Revision : 1 |
2018-04-27 | Apache Tomcat Java JmxRemoteLifecycleListener unauthorized serialized object ... RuleID : 46071 - Type : SERVER-APACHE - Revision : 1 |
2017-11-09 | Apache Tomcat remote JSP file upload attempt RuleID : 44531 - Type : SERVER-APACHE - Revision : 3 |
2016-09-20 | Apache Tomcat Commons FileUpload library denial of service attempt RuleID : 39908 - Type : SERVER-APACHE - Revision : 5 |
2016-07-28 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737-community - Type : SERVER-WEBAPP - Revision : 2 |
2016-08-31 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737 - Type : SERVER-WEBAPP - Revision : 2 |
2014-11-16 | http POST request smuggling attempt RuleID : 31213 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2014-11-16 | http GET request smuggling attempt RuleID : 31212 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2014-03-22 | Apache Tomcat infinite loop denial of service attempt RuleID : 29896 - Type : SERVER-APACHE - Revision : 2 |
2014-01-10 | PyLoris http DoS tool RuleID : 28532 - Type : MALWARE-TOOLS - Revision : 3 |
2014-01-10 | JBoss JMXInvokerServlet access attempt RuleID : 24343 - Type : SERVER-WEBAPP - Revision : 4 |
2014-01-10 | JBoss web console access attempt RuleID : 24342 - Type : SERVER-WEBAPP - Revision : 4 |
2014-01-10 | JBoss admin-console access RuleID : 21517 - Type : SERVER-WEBAPP - Revision : 6 |
2014-01-10 | JBoss JMX console access attempt RuleID : 21516 - Type : SERVER-WEBAPP - Revision : 9 |
2014-01-10 | Apache Tomcat Java AJP connector invalid header timeout denial of service att... RuleID : 20613 - Type : SPECIFIC-THREATS - Revision : 2 |
2014-01-10 | Apache Tomcat Java AJP connector invalid header timeout DOS attempt RuleID : 20612 - Type : SERVER-APACHE - Revision : 10 |
NessusĀ® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-b1832101b8.nasl - Type: ACT_GATHER_INFO |
2018-12-28 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1415.nasl - Type: ACT_GATHER_INFO |
2018-12-14 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL73008537.nasl - Type: ACT_GATHER_INFO |
2018-12-10 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1385.nasl - Type: ACT_GATHER_INFO |
2018-11-29 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_22bc5327f33f11e8be460019dbb15b3f.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-3080.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1105.nasl - Type: ACT_GATHER_INFO |
2018-11-08 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1099.nasl - Type: ACT_GATHER_INFO |
2018-10-17 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2921.nasl - Type: ACT_GATHER_INFO |
2018-10-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1545.nasl - Type: ACT_GATHER_INFO |
2018-10-15 | Name: The remote Debian host is missing a security update. File: debian_DLA-1544.nasl - Type: ACT_GATHER_INFO |
2018-09-04 | Name: The remote Debian host is missing a security update. File: debian_DLA-1491.nasl - Type: ACT_GATHER_INFO |
2018-08-30 | Name: A web application running on the remote host is affected by multiple vulnerab... File: activemq_5_15_5.nasl - Type: ACT_GATHER_INFO |
2018-08-30 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4281.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2016-0011.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0012.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0154.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0065.nasl - Type: ACT_GATHER_INFO |
2018-08-10 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1227.nasl - Type: ACT_GATHER_INFO |
2018-08-10 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1055.nasl - Type: ACT_GATHER_INFO |
2018-08-10 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1056.nasl - Type: ACT_GATHER_INFO |
2018-07-30 | Name: The remote Debian host is missing a security update. File: debian_DLA-1450.nasl - Type: ACT_GATHER_INFO |
2018-07-30 | Name: The remote Debian host is missing a security update. File: debian_DLA-1453.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1220.nasl - Type: ACT_GATHER_INFO |
2018-04-05 | Name: The remote Fedora host is missing a security update. File: fedora_2018-50f0da5d38.nasl - Type: ACT_GATHER_INFO |