Summary
Detail | |||
---|---|---|---|
Vendor | Apache | First view | 2000-07-20 |
Product | Tomcat | Last view | 2025-06-16 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
0 | 2025-06-16 | CVE-2025-48988 | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. |
0 | 2025-05-29 | CVE-2025-46701 | Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue. |
9.8 | 2025-04-28 | CVE-2025-31651 | Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue. |
7.5 | 2025-04-28 | CVE-2025-31650 | Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue. |
9.8 | 2025-03-10 | CVE-2025-24813 | Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue. |
0 | 2024-11-18 | CVE-2024-52318 | Incorrect object recycling and reuse vulnerability in Apache Tomcat. This issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96. Users are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue. |
0 | 2024-11-18 | CVE-2024-52317 | Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. |
0 | 2024-11-18 | CVE-2024-52316 | Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue. |
7.5 | 2024-11-07 | CVE-2024-38286 | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. Older, unsupported versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. |
0 | 2024-07-03 | CVE-2024-34750 | Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue. |
0 | 2024-03-13 | CVE-2024-24549 | Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. |
0 | 2024-03-13 | CVE-2024-23672 | Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. |
5.3 | 2024-01-19 | CVE-2024-21733 | Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue. |
7.5 | 2023-11-28 | CVE-2023-46589 | Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11Â onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. |
5.3 | 2023-10-10 | CVE-2023-45648 | Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue. |
7.5 | 2023-10-10 | CVE-2023-44487 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
5.3 | 2023-10-10 | CVE-2023-42795 | Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. |
5.9 | 2023-10-10 | CVE-2023-42794 | Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. |
6.1 | 2023-08-25 | CVE-2023-41080 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application. |
7.5 | 2023-06-21 | CVE-2023-34981 | A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. |
7.5 | 2023-05-22 | CVE-2023-28709 | The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. |
4.3 | 2023-03-22 | CVE-2023-28708 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. |
7.5 | 2023-01-03 | CVE-2022-45143 | The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output. |
7.5 | 2022-11-01 | CVE-2022-42252 | If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. |
3.7 | 2022-09-28 | CVE-2021-43980 | The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
14% (20) | CWE-264 | Permissions, Privileges, and Access Controls |
14% (20) | CWE-200 | Information Exposure |
9% (13) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
9% (13) | CWE-20 | Improper Input Validation |
7% (10) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
4% (6) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
2% (4) | CWE-399 | Resource Management Errors |
2% (4) | CWE-287 | Improper Authentication |
2% (3) | CWE-352 | Cross-Site Request Forgery (CSRF) |
2% (3) | CWE-189 | Numeric Errors |
2% (3) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
1% (2) | CWE-755 | Improper Handling of Exceptional Conditions |
1% (2) | CWE-706 | Use of Incorrectly-Resolved Name or Reference |
1% (2) | CWE-502 | Deserialization of Untrusted Data |
1% (2) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (2) | CWE-404 | Improper Resource Shutdown or Release |
1% (2) | CWE-284 | Access Control (Authorization) Issues |
1% (2) | CWE-276 | Incorrect Default Permissions |
1% (2) | CWE-16 | Configuration |
0% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
0% (1) | CWE-754 | Improper Check for Unusual or Exceptional Conditions |
0% (1) | CWE-668 | Exposure of Resource to Wrong Sphere |
0% (1) | CWE-667 | Insufficient Locking |
0% (1) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
0% (1) | CWE-476 | NULL Pointer Dereference |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-33 | HTTP Request Smuggling |
CAPEC-102 | Session Sidejacking |
CAPEC-105 | HTTP Request Splitting |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:10499 | Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remo... |
oval:org.mitre.oval:def:10643 | Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before... |
oval:org.mitre.oval:def:22631 | ELSA-2007:0327: tomcat security update (Important) |
oval:org.mitre.oval:def:10514 | Cross-site scripting (XSS) vulnerability in implicit-objects.jsp in Apache To... |
oval:org.mitre.oval:def:10679 | Cross-site scripting (XSS) vulnerability in certain applications using Apache... |
oval:org.mitre.oval:def:6111 | HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (... |
oval:org.mitre.oval:def:10578 | Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in t... |
oval:org.mitre.oval:def:7601 | DSA-1468 tomcat5.5 -- several vulnerabilities |
oval:org.mitre.oval:def:20358 | DSA-1468-1 tomcat5.5 |
oval:org.mitre.oval:def:11287 | Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2... |
oval:org.mitre.oval:def:22687 | ELSA-2007:0569: tomcat security update (Moderate) |
oval:org.mitre.oval:def:11269 | Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1... |
oval:org.mitre.oval:def:9549 | Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1... |
oval:org.mitre.oval:def:10077 | Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apac... |
oval:org.mitre.oval:def:22357 | ELSA-2007:0871: tomcat security update (Moderate) |
oval:org.mitre.oval:def:9202 | Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4... |
oval:org.mitre.oval:def:7989 | DSA-1447 tomcat5.5 -- several vulnerabilities |
oval:org.mitre.oval:def:7988 | DSA-1453 tomcat5 -- several vulnerabilities |
oval:org.mitre.oval:def:18716 | DSA-1447-1 tomcat5.5 several vulnerabilities |
oval:org.mitre.oval:def:18430 | DSA-1453-1 tomcat5 - several vulnerabilities |
oval:org.mitre.oval:def:10417 | The default catalina.policy in the JULI logging component in Apache Tomcat 5.... |
oval:org.mitre.oval:def:21709 | ELSA-2008:0042: tomcat security update (Moderate) |
oval:org.mitre.oval:def:11177 | Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4... |
oval:org.mitre.oval:def:8361 | DSA-1593 tomcat5.5 -- missing input sanitising |
oval:org.mitre.oval:def:6009 | Security vulnerability in the Virtual Host Manager in Tomcat 5.5 bundled with... |
SAINT Exploits
Description | Link |
---|---|
Apache Tomcat PUT method JSP upload | More info here |
HP Performance Manager Apache Tomcat Policy Bypass | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
78573 | Apache Tomcat CPU Consumption Parameter Saturation Remote DoS |
78483 | Hitachi Cosminexus Multiple Product Hash Collission Form Parameter Parsing Re... |
78331 | Apache Tomcat Request Object Recycling Information Disclosure |
78113 | Apache Tomcat Hash Collission Form Parameter Parsing Remote DoS |
76944 | Apache Tomcat Manager Application Servlets Access Restriction Bypass |
76189 | Apache Tomcat HTTP DIGEST Authentication Weakness |
74818 | Apache Tomcat AJP Message Injection Authentication Bypass |
74541 | Apache Tomcat Commons Daemon Jsvc Permissions Weakness Arbitrary File Access |
74535 | Apache Tomcat XML Parser Cross-application Multiple File Manipulation |
73798 | Apache Tomcat sendfile Request Start / Endpoint Parsing Local DoS |
73797 | Apache Tomcat sendfile Request Attribute Validation Weakness Local Access Res... |
73776 | Apache Tomcat HTTP BIO Connector HTTP Pipelining Cross-user Remote Response A... |
73429 | Apache Tomcat JMX MemoryUserDatabase Local Password Disclosure |
72407 | Apache Tomcat @ServletSecurity Initial Load Annotation Security Constraint By... |
71558 | Apache Tomcat SecurityManager ServletContext Attribute Traversal Arbitrary Fi... |
71557 | Apache Tomcat HTML Manager Multiple XSS |
71027 | Apache Tomcat @ServletSecurity Annotation Security Constraint Bypass Informat... |
70809 | Apache Tomcat NIO HTTP Connector Request Line Processing DoS |
69512 | Apache Tomcat Set-Cookie Header HTTPOnly Flag Session Hijacking Weakness |
69456 | Apache Tomcat Manager manager/html/sessions Multiple Parameter XSS |
66319 | Apache Tomcat Crafted Transfer-Encoding Header Handling Buffer Recycling Remo... |
64023 | Apache Tomcat WWW-Authenticate Header Local Host Information Disclosure |
62511 | CA Service Desk Tomcat host-manager/html/add name Parameter XSS |
62054 | Apache Tomcat WAR Filename Traversal Work-directory File Deletion |
62053 | Apache Tomcat Autodeployment Process appBase File HTTP Request Authentication... |
ExploitDB Exploits
id | Description |
---|---|
31615 | Apache Commons FileUpload and Apache Tomcat Denial-of-Service |
31130 | Apache Tomcat <= 6.0.15 Cookie Quote Handling Remote Information Disclosur... |
29435 | Apache Tomcat 5.5.25 - CSRF Vulnerabilities |
18305 | PHP Hash Table Collision Proof Of Concept |
12343 | Apache Tomcat v. 5.5.0 to 5.5.29 & 6.0.0 to 6.0.26 information disclosure... |
10085 | ToutVirtual VirtualIQ Pro 3.2 Multiple Vulnerabilities |
6229 | Apache Tomcat < 6.0.18 UTF8 Directory Traversal Vulnerability |
OpenVAS Exploits
id | Description |
---|---|
2012-12-26 | Name : Fedora Update for tomcat FEDORA-2012-20151 File : nvt/gb_fedora_2012_20151_tomcat_fc16.nasl |
2012-12-05 | Name : Apache Tomcat Partial HTTP Requests DoS Vulnerability (Windows) File : nvt/gb_apache_tomcat_partial_http_req_dos_vuln_win.nasl |
2012-11-27 | Name : Apache Tomcat HTTP NIO Denial Of Service Vulnerability (Windows) File : nvt/gb_apache_tomcat_http_nio_connector_dos_vuln_win.nasl |
2012-11-27 | Name : Apache Tomcat Multiple Security Bypass Vulnerabilities (Windows) File : nvt/gb_apache_tomcat_mult_sec_bypass_vuln_win.nasl |
2012-11-26 | Name : FreeBSD Ports: tomcat File : nvt/freebsd_tomcat2.nasl |
2012-11-23 | Name : Ubuntu Update for tomcat6 USN-1637-1 File : nvt/gb_ubuntu_USN_1637_1.nasl |
2012-08-14 | Name : Fedora Update for tomcat6 FEDORA-2012-7593 File : nvt/gb_fedora_2012_7593_tomcat6_fc16.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-24 (apache tomcat) File : nvt/glsa_201206_24.nasl |
2012-08-03 | Name : Mandriva Update for tomcat5 MDVSA-2012:085 (tomcat5) File : nvt/gb_mandriva_MDVSA_2012_085.nasl |
2012-08-02 | Name : SuSE Update for tomcat6 openSUSE-SU-2012:0208-1 (tomcat6) File : nvt/gb_suse_2012_0208_1.nasl |
2012-07-30 | Name : CentOS Update for tomcat6 CESA-2011:1780 centos6 File : nvt/gb_CESA-2011_1780_tomcat6_centos6.nasl |
2012-07-30 | Name : CentOS Update for tomcat5 CESA-2011:1845 centos5 x86_64 File : nvt/gb_CESA-2011_1845_tomcat5_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for tomcat5 CESA-2012:0474 centos5 File : nvt/gb_CESA-2012_0474_tomcat5_centos5.nasl |
2012-07-30 | Name : CentOS Update for tomcat6 CESA-2012:0475 centos6 File : nvt/gb_CESA-2012_0475_tomcat6_centos6.nasl |
2012-07-09 | Name : RedHat Update for tomcat6 RHSA-2011:1780-01 File : nvt/gb_RHSA-2011_1780-01_tomcat6.nasl |
2012-07-09 | Name : RedHat Update for tomcat6 RHSA-2012:0475-01 File : nvt/gb_RHSA-2012_0475-01_tomcat6.nasl |
2012-06-06 | Name : RedHat Update for tomcat6 RHSA-2011:0335-01 File : nvt/gb_RHSA-2011_0335-01_tomcat6.nasl |
2012-06-06 | Name : RedHat Update for tomcat6 RHSA-2011:0791-01 File : nvt/gb_RHSA-2011_0791-01_tomcat6.nasl |
2012-04-13 | Name : RedHat Update for tomcat5 RHSA-2012:0474-01 File : nvt/gb_RHSA-2012_0474-01_tomcat5.nasl |
2012-04-02 | Name : Fedora Update for apache-commons-daemon FEDORA-2011-10880 File : nvt/gb_fedora_2011_10880_apache-commons-daemon_fc16.nasl |
2012-04-02 | Name : Fedora Update for tomcat6 FEDORA-2011-13426 File : nvt/gb_fedora_2011_13426_tomcat6_fc16.nasl |
2012-03-16 | Name : VMSA-2011-0003.2 Third party component updates for VMware vCenter Server, vCe... File : nvt/gb_VMSA-2011-0003.nasl |
2012-03-16 | Name : VMSA-2012-0005 VMware vCenter Server, Orchestrator, Update Manager, vShield, ... File : nvt/gb_VMSA-2012-0005.nasl |
2012-02-21 | Name : Ubuntu Update for tomcat6 USN-1359-1 File : nvt/gb_ubuntu_USN_1359_1.nasl |
2012-02-12 | Name : Debian Security Advisory DSA 2401-1 (tomcat6) File : nvt/deb_2401_1.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0160 | Multiple Vulnerabilities in Oracle Linux and Virtualization Severity: Category I - VMSKEY: V0061123 |
2015-B-0083 | Multiple Vulnerabilities in IBM Storwize V7000 Unified Severity: Category I - VMSKEY: V0060983 |
2015-B-0065 | Apache Tomcat Security Bypass Vulnerability Severity: Category I - VMSKEY: V0060761 |
2014-B-0090 | Multiple Vulnerabilities in VMware vCenter Operations Severity: Category I - VMSKEY: V0052895 |
2014-B-0063 | Multiple Vulnerabilities in Apache Tomcat Severity: Category I - VMSKEY: V0051613 |
2014-B-0065 | Multiple Vulnerabilities in IBM WebSphere Application Server Severity: Category I - VMSKEY: V0051617 |
2014-B-0019 | Multiple Vulnerabilities in Apache Tomcat Severity: Category I - VMSKEY: V0044527 |
2014-A-0009 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0043395 |
2013-A-0219 | Multiple Vulnerabilities in Juniper Networks and Security Manager Severity: Category I - VMSKEY: V0042384 |
2013-A-0177 | Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform Severity: Category I - VMSKEY: V0040288 |
2013-B-0047 | Multiple Vulnerabilities in Apache Tomcat Severity: Category I - VMSKEY: V0037947 |
2012-B-0048 | Multiple Vulnerabilities in HP Systems Insight Manager Severity: Category I - VMSKEY: V0032178 |
2011-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0027158 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | .cmd? access RuleID : 9791 - Type : SERVER-WEBAPP - Revision : 8 |
2014-01-10 | .bat? access RuleID : 976-community - Type : SERVER-WEBAPP - Revision : 21 |
2014-01-10 | .bat? access RuleID : 976 - Type : SERVER-WEBAPP - Revision : 21 |
2020-11-24 | Apache Tomcat WebSocket length denial of service attempt RuleID : 56086 - Type : SERVER-WEBAPP - Revision : 1 |
2020-10-22 | Apache Tomcat HTTP/2 denial of service attempt RuleID : 55801 - Type : SERVER-WEBAPP - Revision : 1 |
2020-10-22 | Apache Tomcat HTTP/2 denial of service attempt RuleID : 55800 - Type : SERVER-WEBAPP - Revision : 1 |
2020-07-07 | Apache Tomcat FileStore directory traversal attempt RuleID : 54162 - Type : SERVER-WEBAPP - Revision : 1 |
2020-02-26 | Apache Tomcat AJP connector arbitrary file access attempt RuleID : 53341-community - Type : SERVER-APACHE - Revision : 2 |
2020-03-31 | Apache Tomcat AJP connector arbitrary file access attempt RuleID : 53341 - Type : SERVER-APACHE - Revision : 2 |
2020-01-16 | Apache Tomcat chunked transfer encoding denial of service attempt RuleID : 52471 - Type : SERVER-APACHE - Revision : 1 |
2018-04-27 | Apache Tomcat Java JmxRemoteLifecycleListener unauthorized serialized object ... RuleID : 46071 - Type : SERVER-APACHE - Revision : 1 |
2017-11-09 | Apache Tomcat remote JSP file upload attempt RuleID : 44531 - Type : SERVER-APACHE - Revision : 3 |
2016-09-20 | Apache Tomcat Commons FileUpload library denial of service attempt RuleID : 39908 - Type : SERVER-APACHE - Revision : 5 |
2016-07-28 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737-community - Type : SERVER-WEBAPP - Revision : 2 |
2016-08-31 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737 - Type : SERVER-WEBAPP - Revision : 2 |
2014-11-16 | http POST request smuggling attempt RuleID : 31213 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2014-11-16 | http GET request smuggling attempt RuleID : 31212 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2014-03-22 | Apache Tomcat infinite loop denial of service attempt RuleID : 29896 - Type : SERVER-APACHE - Revision : 2 |
2014-01-10 | PyLoris http DoS tool RuleID : 28532 - Type : MALWARE-TOOLS - Revision : 3 |
2014-01-10 | JBoss JMXInvokerServlet access attempt RuleID : 24343 - Type : SERVER-WEBAPP - Revision : 4 |
2014-01-10 | JBoss web console access attempt RuleID : 24342 - Type : SERVER-WEBAPP - Revision : 4 |
2014-01-10 | JBoss admin-console access RuleID : 21517 - Type : SERVER-WEBAPP - Revision : 6 |
2014-01-10 | JBoss JMX console access attempt RuleID : 21516 - Type : SERVER-WEBAPP - Revision : 9 |
2014-01-10 | Apache Tomcat Java AJP connector invalid header timeout denial of service att... RuleID : 20613 - Type : SPECIFIC-THREATS - Revision : 2 |
2014-01-10 | Apache Tomcat Java AJP connector invalid header timeout DOS attempt RuleID : 20612 - Type : SERVER-APACHE - Revision : 10 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-b1832101b8.nasl - Type: ACT_GATHER_INFO |
2018-12-28 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1415.nasl - Type: ACT_GATHER_INFO |
2018-12-14 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL73008537.nasl - Type: ACT_GATHER_INFO |
2018-12-10 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1385.nasl - Type: ACT_GATHER_INFO |
2018-11-29 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_22bc5327f33f11e8be460019dbb15b3f.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-3080.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1105.nasl - Type: ACT_GATHER_INFO |
2018-11-08 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1099.nasl - Type: ACT_GATHER_INFO |
2018-10-17 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2921.nasl - Type: ACT_GATHER_INFO |
2018-10-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1545.nasl - Type: ACT_GATHER_INFO |
2018-10-15 | Name: The remote Debian host is missing a security update. File: debian_DLA-1544.nasl - Type: ACT_GATHER_INFO |
2018-09-04 | Name: The remote Debian host is missing a security update. File: debian_DLA-1491.nasl - Type: ACT_GATHER_INFO |
2018-08-30 | Name: A web application running on the remote host is affected by multiple vulnerab... File: activemq_5_15_5.nasl - Type: ACT_GATHER_INFO |
2018-08-30 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4281.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2016-0011.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0012.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0154.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0065.nasl - Type: ACT_GATHER_INFO |
2018-08-10 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1227.nasl - Type: ACT_GATHER_INFO |
2018-08-10 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1055.nasl - Type: ACT_GATHER_INFO |
2018-08-10 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1056.nasl - Type: ACT_GATHER_INFO |
2018-07-30 | Name: The remote Debian host is missing a security update. File: debian_DLA-1450.nasl - Type: ACT_GATHER_INFO |
2018-07-30 | Name: The remote Debian host is missing a security update. File: debian_DLA-1453.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1220.nasl - Type: ACT_GATHER_INFO |
2018-04-05 | Name: The remote Fedora host is missing a security update. File: fedora_2018-50f0da5d38.nasl - Type: ACT_GATHER_INFO |