Search CVE reports
71 – 80 of 106 results
Some fixes available 1 of 2
As part of the fix for bug 61201, the documentation for Apache Tomcat 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47 and 7.0.79 to 7.0.82 included an updated description of the search algorithm used by the CGI Servlet to...
3 affected packages
tomcat7, tomcat8, tomcat8.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat7 | — | — | — | Not affected |
tomcat8 | — | — | — | Not affected |
tomcat8.0 | — | — | — | Not in release |
Some fixes available 4 of 10
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was...
3 affected packages
tomcat7, tomcat8, tomcat8.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat7 | Not in release | Not in release | Not in release | Ignored |
tomcat8 | Not in release | Not in release | Not in release | Not affected |
tomcat8.0 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 2 of 7
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
2 affected packages
tomcat7, tomcat8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat7 | Not in release | Not in release | Not in release | Ignored |
tomcat8 | Not in release | Not in release | Not in release | Not affected |
Some fixes available 9 of 12
The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 on Debian wheezy, before 6.0.45+dfsg-1~deb8u1 on Debian jessie, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before...
3 affected packages
tomcat6, tomcat8, tomcat7
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat6 | Not in release | Not in release | Not in release | Not in release |
tomcat8 | Not in release | Not in release | Not in release | Fixed |
tomcat7 | Not in release | Not in release | Not in release | Not affected |
Some fixes available 9 of 12
The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 on Debian wheezy, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u8 on Debian wheezy, before...
3 affected packages
tomcat7, tomcat6, tomcat8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat7 | Not in release | Not in release | Not in release | Not affected |
tomcat6 | Not in release | Not in release | Not in release | Not in release |
tomcat8 | Not in release | Not in release | Not in release | Fixed |
An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be...
1 affected package
tomcat8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat8 | — | — | — | — |
Some fixes available 9 of 15
A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor...
3 affected packages
tomcat7, tomcat8, tomcat6
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat7 | Not in release | Not in release | Not in release | Not affected |
tomcat8 | Not in release | Not in release | Not in release | Fixed |
tomcat6 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 11 of 13
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The...
3 affected packages
tomcat6, tomcat7, tomcat8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat6 | Not in release | Not in release | Not in release | Not in release |
tomcat7 | Not in release | Not in release | Not in release | Not affected |
tomcat8 | Not in release | Not in release | Not in release | Fixed |
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
3 affected packages
tomcat6, tomcat7, tomcat8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat6 | — | — | — | — |
tomcat7 | — | — | — | — |
tomcat8 | — | — | — | — |
Some fixes available 10 of 13
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction...
3 affected packages
tomcat6, tomcat7, tomcat8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat6 | Not in release | Not in release | Not in release | Not in release |
tomcat7 | Not in release | Not in release | Not in release | Not affected |
tomcat8 | Not in release | Not in release | Not in release | Fixed |