Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
By Recent Activity
apache tomcat 5.5.2 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-3510
Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files....
Apache Tomcat 5.5.2
Apache Tomcat 5.5.3
Apache Tomcat 5.5.4
Apache Tomcat 5.5.10
Apache Tomcat 5.5.11
Apache Tomcat 5.5.9
Apache Tomcat 5.5.0
Apache Tomcat 5.5.1
Apache Tomcat 5.5.7
Apache Tomcat 5.5.8
Apache Tomcat 5.5.5
Apache Tomcat 5.5.6
4.3
CVSSv2
CVE-2007-3386
Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action....
Apache Tomcat 5.5.13
Apache Tomcat 5.5.14
Apache Tomcat 5.5.20
Apache Tomcat 5.5.21
Apache Tomcat 5.5.6
Apache Tomcat 5.5.7
Apache Tomcat 5.5.8
Apache Tomcat 6.0.13
Apache Tomcat 6.0.2
Apache Tomcat 6.0.9
Apache Tomcat 5.5.0
Apache Tomcat 5.5.15
Apache Tomcat 5.5.16
Apache Tomcat 5.5.22
Apache Tomcat 5.5.23
Apache Tomcat 5.5.9
Apache Tomcat 6.0.0
Apache Tomcat 6.0.3
Apache Tomcat 6.0.4
Apache Tomcat 5.5.1
Apache Tomcat 5.5.10
Apache Tomcat 5.5.17
Apache Tomcat 5.5.18
Apache Tomcat 5.5.24
Apache Tomcat 5.5.3
Apache Tomcat 6.0.1
Apache Tomcat 6.0.10
Apache Tomcat 6.0.5
Apache Tomcat 6.0.6
Apache Tomcat 5.5.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.19
Apache Tomcat 5.5.2
Apache Tomcat 5.5.4
Apache Tomcat 5.5.5
Apache Tomcat 6.0.11
Apache Tomcat 6.0.12
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
1 EDB exploit available
2.6
CVSSv2
CVE-2010-1157
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the...
Apache Tomcat 5.5.1
Apache Tomcat 5.5.10
Apache Tomcat 5.5.18
Apache Tomcat 5.5.19
Apache Tomcat 5.5.25
Apache Tomcat 5.5.26
Apache Tomcat 5.5.6
Apache Tomcat 5.5.7
Apache Tomcat 5.5.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.13
Apache Tomcat 5.5.2
Apache Tomcat 5.5.20
Apache Tomcat 5.5.27
Apache Tomcat 5.5.28
Apache Tomcat 5.5.8
Apache Tomcat 5.5.9
Apache Tomcat 5.5.0
Apache Tomcat 5.5.16
Apache Tomcat 5.5.17
Apache Tomcat 5.5.23
Apache Tomcat 5.5.24
Apache Tomcat 5.5.4
Apache Tomcat 5.5.5
Apache Tomcat 5.5.14
Apache Tomcat 5.5.15
Apache Tomcat 5.5.21
Apache Tomcat 5.5.22
Apache Tomcat 5.5.29
Apache Tomcat 5.5.3
Apache Tomcat 6.0.12
Apache Tomcat 6.0.13
Apache Tomcat 6.0.2
Apache Tomcat 6.0.20
Apache Tomcat 6.0.14
Apache Tomcat 6.0.15
Apache Tomcat 6.0.24
Apache Tomcat 6.0.26
Apache Tomcat 6.0.10
Apache Tomcat 6.0.11
Apache Tomcat 6.0.18
Apache Tomcat 6.0.19
Apache Tomcat 6.0.5
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
Apache Tomcat 6.0.0
Apache Tomcat 6.0.1
Apache Tomcat 6.0.16
Apache Tomcat 6.0.17
Apache Tomcat 6.0.3
Apache Tomcat 6.0.4
1 EDB exploit available
6.4
CVSSv2
CVE-2010-2227
Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that...
Apache Tomcat 5.5.27
Apache Tomcat 5.5.9
Apache Tomcat 5.5.17
Apache Tomcat 5.5.18
Apache Tomcat 5.5.3
Apache Tomcat 5.5.22
Apache Tomcat 5.5.0
Apache Tomcat 5.5.8
Apache Tomcat 5.5.7
Apache Tomcat 5.5.15
Apache Tomcat 5.5.16
Apache Tomcat 5.5.13
Apache Tomcat 5.5.23
Apache Tomcat 5.5.26
Apache Tomcat 5.5.25
Apache Tomcat 5.5.10
Apache Tomcat 5.5.6
Apache Tomcat 5.5.5
Apache Tomcat 5.5.14
Apache Tomcat 5.5.11
Apache Tomcat 5.5.20
Apache Tomcat 5.5.21
Apache Tomcat 5.5.1
Apache Tomcat 5.5.28
Apache Tomcat 5.5.4
Apache Tomcat 5.5.29
Apache Tomcat 5.5.12
Apache Tomcat 5.5.24
Apache Tomcat 5.5.19
Apache Tomcat 5.5.2
Apache Tomcat 6.0.15
Apache Tomcat 6.0.18
Apache Tomcat 6.0.1
Apache Tomcat 6.0.0
Apache Tomcat 6.0.12
Apache Tomcat 6.0.11
Apache Tomcat 6.0.14
Apache Tomcat 6.0.6
Apache Tomcat 6.0.5
Apache Tomcat 6.0.4
Apache Tomcat 6.0.10
Apache Tomcat 6.0.20
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.3
Apache Tomcat 6.0.2
Apache Tomcat 6.0.19
Apache Tomcat 6.0.16
Apache Tomcat 6.0.9
Apache Tomcat 6.0.17
Apache Tomcat 6.0.13
Apache Tomcat 6.0.24
Apache Tomcat 6.0.26
Apache Tomcat 6.0.27
Apache Tomcat 7.0.0
2 Metasploit modules available
1 Github repository available
4.3
CVSSv2
CVE-2006-7196
CVE-2006-7196 tomcat XSS in example webapps...
Apache Tomcat 4.0.4
Apache Tomcat 5.0.8
Apache Tomcat 5.0.19
Apache Tomcat 5.5.12
Apache Tomcat 5.0.14
Apache Tomcat 5.5.14
Apache Tomcat 5.5.10
Apache Tomcat 5.0.22
Apache Tomcat 5.5.4
Apache Tomcat 5.5.7
Apache Tomcat 5.5.1
Apache Tomcat 5.0.7
Apache Tomcat 5.5.11
Apache Tomcat 5.5.6
Apache Tomcat 5.0.9
Apache Tomcat 5.0.15
Apache Tomcat 5.0.30
Apache Tomcat 5.5.15
Apache Tomcat 5.0.23
Apache Tomcat 5.0.2
Apache Tomcat 5.5.5
Apache Tomcat 5.0.10
Apache Tomcat 5.0.21
Apache Tomcat 5.0.26
Apache Tomcat 5.0.0
Apache Tomcat 5.0.6
Apache Tomcat 5.5.3
Apache Tomcat 5.0.27
Apache Tomcat 5.0.16
Apache Tomcat 4.0.6
Apache Tomcat 5.5.9
Apache Tomcat 4.0.3
Apache Tomcat 5.0.18
Apache Tomcat 4.0.1
Apache Tomcat 5.5.2
Apache Tomcat 5.0.5
Apache Tomcat 5.0.28
Apache Tomcat 5.0.29
Apache Tomcat 5.5.0
Apache Tomcat 5.5.13
Apache Tomcat 5.0.13
Apache Tomcat 5.5.8
Apache Tomcat 5.0.17
Apache Tomcat 4.0.2
Apache Tomcat 4.0.5
Apache Tomcat 4.0.0
Apache Tomcat 5.0.4
Apache Tomcat 5.0.25
Apache Tomcat 5.0.1
Apache Tomcat 5.0.11
Apache Tomcat 5.0.3
Apache Tomcat
Apache Tomcat 5.0.24
Apache Tomcat 5.0.12
1 EDB exploit available
4.3
CVSSv2
CVE-2009-2901
The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests....
Apache Tomcat 5.5.25
Apache Tomcat 5.5.10
Apache Tomcat 5.5.6
Apache Tomcat 5.5.5
Apache Tomcat 5.5.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.21
Apache Tomcat 5.5.19
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
Apache Tomcat 6.0.2
Apache Tomcat 6.0.13
Apache Tomcat 5.5.27
Apache Tomcat 5.5.9
Apache Tomcat 5.5.18
Apache Tomcat 5.5.15
Apache Tomcat 5.5.16
Apache Tomcat 5.5.22
Apache Tomcat 5.5.26
Apache Tomcat 6.0
Apache Tomcat 6.0.14
Apache Tomcat 6.0.0
Apache Tomcat 6.0.5
Apache Tomcat 6.0.10
Apache Tomcat 6.0.16
Apache Tomcat 5.5.1
Apache Tomcat 5.5.28
Apache Tomcat 5.5.4
Apache Tomcat 5.5.17
Apache Tomcat 5.5.24
Apache Tomcat 5.5.3
Apache Tomcat 5.5.2
Apache Tomcat 6.0.15
Apache Tomcat 6.0.17
Apache Tomcat 6.0.18
Apache Tomcat 6.0.1
Apache Tomcat 6.0.12
Apache Tomcat 6.0.11
Apache Tomcat 5.5.0
Apache Tomcat 5.5.8
Apache Tomcat 5.5.7
Apache Tomcat 5.5.13
Apache Tomcat 5.5.14
Apache Tomcat 5.5.23
Apache Tomcat 5.5.20
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 6.0.4
Apache Tomcat 6.0.3
Apache Tomcat 6.0.19
Apache Tomcat 6.0.20
4.3
CVSSv2
CVE-2009-2902
Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename....
Apache Tomcat 5.5.25
Apache Tomcat 5.5.10
Apache Tomcat 5.5.5
Apache Tomcat 5.5.4
Apache Tomcat 5.5.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.21
Apache Tomcat 5.5.19
Apache Tomcat 6.0.9
Apache Tomcat 5.5.27
Apache Tomcat 5.5.9
Apache Tomcat 5.5.15
Apache Tomcat 5.5.16
Apache Tomcat 5.5.22
Apache Tomcat 5.5.26
Apache Tomcat 6.0
Apache Tomcat 6.0.14
Apache Tomcat 6.0.0
Apache Tomcat 6.0.5
Apache Tomcat 6.0.10
Apache Tomcat 6.0.16
Apache Tomcat 6.0.17
Apache Tomcat 6.0.2
Apache Tomcat 6.0.13
Apache Tomcat 5.5.1
Apache Tomcat 5.5.28
Apache Tomcat 5.5.17
Apache Tomcat 5.5.18
Apache Tomcat 5.5.24
Apache Tomcat 5.5.3
Apache Tomcat 5.5.2
Apache Tomcat 6.0.15
Apache Tomcat 6.0.18
Apache Tomcat 6.0.1
Apache Tomcat 6.0.12
Apache Tomcat 6.0.11
Apache Tomcat 5.5.0
Apache Tomcat 5.5.8
Apache Tomcat 5.5.7
Apache Tomcat 5.5.6
Apache Tomcat 5.5.13
Apache Tomcat 5.5.14
Apache Tomcat 5.5.23
Apache Tomcat 5.5.20
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.4
Apache Tomcat 6.0.3
Apache Tomcat 6.0.19
Apache Tomcat 6.0.20
4.3
CVSSv2
CVE-2011-0013
CVE-2011-0013 tomcat: XSS vulnerability in HTML Manager interface...
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.5
Apache Tomcat 7.0.0
Apache Tomcat 7.0.4
Apache Tomcat 7.0.3
Apache Tomcat 6.0.6
Apache Tomcat 6.0.11
Apache Tomcat 6.0.7
Apache Tomcat 6.0.4
Apache Tomcat 6.0.15
Apache Tomcat 6.0.20
Apache Tomcat 6.0.10
Apache Tomcat 6.0.29
Apache Tomcat 6.0.3
Apache Tomcat 6.0.9
Apache Tomcat 6.0.24
Apache Tomcat 6.0.17
Apache Tomcat 6.0
Apache Tomcat 6.0.28
Apache Tomcat 6.0.0
Apache Tomcat 6.0.14
Apache Tomcat 6.0.1
Apache Tomcat 6.0.12
Apache Tomcat 6.0.18
Apache Tomcat 6.0.5
Apache Tomcat 6.0.2
Apache Tomcat 6.0.13
Apache Tomcat 6.0.26
Apache Tomcat 6.0.19
Apache Tomcat 6.0.27
Apache Tomcat 6.0.16
Apache Tomcat 6.0.8
Apache Tomcat 5.5.27
Apache Tomcat 5.5.18
Apache Tomcat 5.5.12
Apache Tomcat 5.5.14
Apache Tomcat 5.5.10
Apache Tomcat 5.5.4
Apache Tomcat 5.5.7
Apache Tomcat 5.5.1
Apache Tomcat 5.5.11
Apache Tomcat 5.5.28
Apache Tomcat 5.5.6
Apache Tomcat 5.5.26
Apache Tomcat 5.5.20
Apache Tomcat 5.5.15
Apache Tomcat 5.5.5
Apache Tomcat 5.5.30
Apache Tomcat 5.5.21
Apache Tomcat 5.5.22
Apache Tomcat 5.5.3
Apache Tomcat 5.5.31
Apache Tomcat 5.5.9
Apache Tomcat 5.5.25
Apache Tomcat 5.5.2
Apache Tomcat 5.5.0
Apache Tomcat 5.5.13
Apache Tomcat 5.5.24
Apache Tomcat 5.5.8
Apache Tomcat 5.5.16
Apache Tomcat 5.5.17
Apache Tomcat 5.5.29
Apache Tomcat 5.5.19
Apache Tomcat 5.5.23
1.2
CVSSv2
CVE-2010-3718
Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a...
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 6.0.14
Apache Tomcat 6.0.17
Apache Tomcat 6.0.16
Apache Tomcat 6.0.1
Apache Tomcat 6.0.12
Apache Tomcat 6.0.11
Apache Tomcat 6.0.10
Apache Tomcat 6.0.18
Apache Tomcat 6.0.27
Apache Tomcat 6.0.0
Apache Tomcat 6.0.5
Apache Tomcat 6.0.20
Apache Tomcat 6.0.19
Apache Tomcat 6.0.15
Apache Tomcat 6.0
Apache Tomcat 6.0.29
Apache Tomcat 6.0.28
Apache Tomcat 6.0.2
Apache Tomcat 6.0.13
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
Apache Tomcat 6.0.26
Apache Tomcat 6.0.24
Apache Tomcat 6.0.4
Apache Tomcat 6.0.3
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 5.5.25
Apache Tomcat 5.5.27
Apache Tomcat 5.5.9
Apache Tomcat 5.5.18
Apache Tomcat 5.5.15
Apache Tomcat 5.5.16
Apache Tomcat 5.5.22
Apache Tomcat 5.5.23
Apache Tomcat 5.5.28
Apache Tomcat 5.5.29
Apache Tomcat 5.5.8
Apache Tomcat 5.5.7
Apache Tomcat 5.5.13
Apache Tomcat 5.5.14
Apache Tomcat 5.5.20
Apache Tomcat 5.5.21
Apache Tomcat 5.5.10
Apache Tomcat 5.5.1
Apache Tomcat 5.5.4
Apache Tomcat 5.5.17
Apache Tomcat 5.5.24
Apache Tomcat 5.5.3
Apache Tomcat 5.5.32
Apache Tomcat 5.5.30
Apache Tomcat 5.5.26
Apache Tomcat 5.5.0
Apache Tomcat 5.5.6
Apache Tomcat 5.5.5
Apache Tomcat 5.5.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.19
Apache Tomcat 5.5.2
5
CVSSv2
CVE-2011-5062
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a...
Apache Tomcat 5.5.30
Apache Tomcat 5.5.0
Apache Tomcat 5.5.8
Apache Tomcat 5.5.33
Apache Tomcat 5.5.18
Apache Tomcat 5.5.15
Apache Tomcat 5.5.3
Apache Tomcat 5.5.22
Apache Tomcat 5.5.2
Apache Tomcat 5.5.1
Apache Tomcat 5.5.28
Apache Tomcat 5.5.4
Apache Tomcat 5.5.29
Apache Tomcat 5.5.14
Apache Tomcat 5.5.11
Apache Tomcat 5.5.32
Apache Tomcat 5.5.20
Apache Tomcat 5.5.27
Apache Tomcat 5.5.9
Apache Tomcat 5.5.31
Apache Tomcat 5.5.17
Apache Tomcat 5.5.12
Apache Tomcat 5.5.24
Apache Tomcat 5.5.21
Apache Tomcat 5.5.19
Apache Tomcat 5.5.25
Apache Tomcat 5.5.10
Apache Tomcat 5.5.7
Apache Tomcat 5.5.6
Apache Tomcat 5.5.5
Apache Tomcat 5.5.16
Apache Tomcat 5.5.13
Apache Tomcat 5.5.23
Apache Tomcat 5.5.26
Apache Tomcat 6.0.15
Apache Tomcat 6.0.9
Apache Tomcat 6.0.29
Apache Tomcat 6.0.4
Apache Tomcat 6.0.27
Apache Tomcat 6.0.31
Apache Tomcat 6.0.12
Apache Tomcat 6.0.11
Apache Tomcat 6.0.14
Apache Tomcat 6.0.6
Apache Tomcat 6.0.18
Apache Tomcat 6.0.1
Apache Tomcat 6.0.2
Apache Tomcat 6.0.32
Apache Tomcat 6.0.19
Apache Tomcat 6.0.16
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.0
Apache Tomcat 6.0.5
Apache Tomcat 6.0.24
Apache Tomcat 6.0.13
Apache Tomcat 6.0.30
Apache Tomcat 6.0
Apache Tomcat 6.0.28
Apache Tomcat 6.0.17
Apache Tomcat 6.0.3
Apache Tomcat 6.0.26
Apache Tomcat 6.0.10
Apache Tomcat 6.0.20
Apache Tomcat 7.0.6
Apache Tomcat 7.0.1
Apache Tomcat 7.0.3
Apache Tomcat 7.0.7
Apache Tomcat 7.0.2
Apache Tomcat 7.0.0
Apache Tomcat 7.0.5
Apache Tomcat 7.0.4
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
Apache Tomcat 7.0.9
Apache Tomcat 7.0.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-20607
arbitrary
CVE-2022-3229
CVE-2022-44268
code injection
CVE-2023-25016
CVE-2022-48311
CVE-2022-47949
buffer overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »