Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
By Recent Activity
apache tomcat 6.0.11 vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2008-0002
Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order...
Apache Tomcat 6.0.10
Apache Tomcat 6.0.11
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.12
Apache Tomcat 6.0.13
Apache Tomcat 6.0.9
Apache Tomcat 6.0.5
Apache Tomcat 6.0.6
Apache Tomcat 6.0.14
Apache Tomcat 6.0.15
4.3
CVSSv2
CVE-2007-6286
Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as...
Apache Tomcat 5.5.15
Apache Tomcat 5.5.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.20
Apache Tomcat 5.5.21
Apache Tomcat 6.0.10
Apache Tomcat 6.0.11
Apache Tomcat 6.0.4
Apache Tomcat 6.0.5
Apache Tomcat 5.5.17
Apache Tomcat 5.5.18
Apache Tomcat 5.5.19
Apache Tomcat 6.0.0
Apache Tomcat 6.0.1
Apache Tomcat 6.0.2
Apache Tomcat 6.0.3
Apache Tomcat 5.5.13
Apache Tomcat 5.5.14
Apache Tomcat 5.5.22
Apache Tomcat 5.5.23
Apache Tomcat 6.0.12
Apache Tomcat 6.0.13
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 5.5.16
Apache Tomcat 5.5.24
Apache Tomcat 5.5.25
Apache Tomcat 6.0.14
Apache Tomcat 6.0.15
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
6.4
CVSSv2
CVE-2007-5342
The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as...
Apache Tomcat 5.5.18
Apache Tomcat 6.0.6
Apache Tomcat 6.0.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.14
Apache Tomcat 5.5.10
Apache Tomcat 6.0.7
Apache Tomcat 5.5.11
Apache Tomcat 6.0.4
Apache Tomcat 5.5.20
Apache Tomcat 5.5.15
Apache Tomcat 6.0.15
Apache Tomcat 5.5.21
Apache Tomcat 5.5.22
Apache Tomcat 6.0.10
Apache Tomcat 6.0.3
Apache Tomcat 6.0.9
Apache Tomcat 6.0
Apache Tomcat 5.5.9
Apache Tomcat 5.5.25
Apache Tomcat 6.0.14
Apache Tomcat 5.5.13
Apache Tomcat 6.0.1
Apache Tomcat 6.0.12
Apache Tomcat 5.5.24
Apache Tomcat 5.5.16
Apache Tomcat 6.0.5
Apache Tomcat 5.5.17
Apache Tomcat 5.5.19
Apache Tomcat 6.0.2
Apache Tomcat 6.0.13
Apache Tomcat 5.5.23
Apache Tomcat 6.0.8
6.4
CVSSv2
CVE-2010-4312
The default configuration of Apache Tomcat 6.x does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie....
Apache Tomcat 6.0.15
Apache Tomcat 6.0
Apache Tomcat 6.0.28
Apache Tomcat 6.0.17
Apache Tomcat 6.0.18
Apache Tomcat 6.0.2
Apache Tomcat 6.0.26
Apache Tomcat 6.0.19
Apache Tomcat 6.0.16
Apache Tomcat 6.0.14
Apache Tomcat 6.0.6
Apache Tomcat 6.0.1
Apache Tomcat 6.0.0
Apache Tomcat 6.0.13
Apache Tomcat 6.0.24
Apache Tomcat 6.0.9
Apache Tomcat 6.0.29
Apache Tomcat 6.0.4
Apache Tomcat 6.0.3
Apache Tomcat 6.0.10
Apache Tomcat 6.0.20
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.5
Apache Tomcat 6.0.27
Apache Tomcat 6.0.12
Apache Tomcat 6.0.11
5
CVSSv2
CVE-2011-0534
Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request....
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 7.0.6
Apache Tomcat 7.0.4
Apache Tomcat 7.0.5
Apache Tomcat 6.0.15
Apache Tomcat 6.0.14
Apache Tomcat 6.0.17
Apache Tomcat 6.0.18
Apache Tomcat 6.0.26
Apache Tomcat 6.0.13
Apache Tomcat 6.0.16
Apache Tomcat 6.0.30
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 6.0.1
Apache Tomcat 6.0.0
Apache Tomcat 6.0.5
Apache Tomcat 6.0.24
Apache Tomcat 6.0.12
Apache Tomcat 6.0.29
Apache Tomcat 6.0.28
Apache Tomcat 6.0.3
Apache Tomcat 6.0.2
Apache Tomcat 6.0.20
Apache Tomcat 6.0.19
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
Apache Tomcat 6.0.27
Apache Tomcat 6.0.4
Apache Tomcat 6.0.11
Apache Tomcat 6.0.10
4.3
CVSSv2
CVE-2008-1947
Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add....
Apache Tomcat 5.5.18
Apache Tomcat 6.0.6
Apache Tomcat 6.0.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.14
Apache Tomcat 5.5.10
Apache Tomcat 6.0.7
Apache Tomcat 5.5.11
Apache Tomcat 6.0.4
Apache Tomcat 5.5.26
Apache Tomcat 5.5.20
Apache Tomcat 5.5.15
Apache Tomcat 6.0.15
Apache Tomcat 5.5.21
Apache Tomcat 5.5.22
Apache Tomcat 6.0.10
Apache Tomcat 6.0.3
Apache Tomcat 6.0.9
Apache Tomcat 5.5.9
Apache Tomcat 5.5.25
Apache Tomcat 6.0.0
Apache Tomcat 6.0.14
Apache Tomcat 5.5.13
Apache Tomcat 6.0.1
Apache Tomcat 6.0.12
Apache Tomcat 5.5.24
Apache Tomcat 5.5.16
Apache Tomcat 6.0.5
Apache Tomcat 5.5.17
Apache Tomcat 5.5.19
Apache Tomcat 6.0.2
Apache Tomcat 6.0.13
Apache Tomcat 5.5.23
Apache Tomcat 6.0.16
Apache Tomcat 6.0.8
4.3
CVSSv2
CVE-2007-3386
Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action....
Apache Tomcat 5.5.13
Apache Tomcat 5.5.14
Apache Tomcat 5.5.20
Apache Tomcat 5.5.21
Apache Tomcat 5.5.6
Apache Tomcat 5.5.7
Apache Tomcat 5.5.8
Apache Tomcat 6.0.13
Apache Tomcat 6.0.2
Apache Tomcat 6.0.9
Apache Tomcat 5.5.0
Apache Tomcat 5.5.15
Apache Tomcat 5.5.16
Apache Tomcat 5.5.22
Apache Tomcat 5.5.23
Apache Tomcat 5.5.9
Apache Tomcat 6.0.0
Apache Tomcat 6.0.3
Apache Tomcat 6.0.4
Apache Tomcat 5.5.1
Apache Tomcat 5.5.10
Apache Tomcat 5.5.17
Apache Tomcat 5.5.18
Apache Tomcat 5.5.24
Apache Tomcat 5.5.3
Apache Tomcat 6.0.1
Apache Tomcat 6.0.10
Apache Tomcat 6.0.5
Apache Tomcat 6.0.6
Apache Tomcat 5.5.11
Apache Tomcat 5.5.12
Apache Tomcat 5.5.19
Apache Tomcat 5.5.2
Apache Tomcat 5.5.4
Apache Tomcat 5.5.5
Apache Tomcat 6.0.11
Apache Tomcat 6.0.12
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
1 EDB exploit available
2.6
CVSSv2
CVE-2010-1157
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the...
Apache Tomcat 5.5.27
Apache Tomcat 5.5.18
Apache Tomcat 5.5.12
Apache Tomcat 5.5.14
Apache Tomcat 5.5.10
Apache Tomcat 5.5.4
Apache Tomcat 5.5.7
Apache Tomcat 5.5.1
Apache Tomcat 5.5.11
Apache Tomcat 5.5.28
Apache Tomcat 5.5.6
Apache Tomcat 5.5.26
Apache Tomcat 5.5.20
Apache Tomcat 5.5.15
Apache Tomcat 5.5.5
Apache Tomcat 5.5.21
Apache Tomcat 5.5.22
Apache Tomcat 5.5.3
Apache Tomcat 5.5.9
Apache Tomcat 5.5.25
Apache Tomcat 5.5.2
Apache Tomcat 5.5.0
Apache Tomcat 5.5.13
Apache Tomcat 5.5.24
Apache Tomcat 5.5.8
Apache Tomcat 5.5.16
Apache Tomcat 5.5.17
Apache Tomcat 5.5.29
Apache Tomcat 5.5.19
Apache Tomcat 5.5.23
Apache Tomcat 6.0.6
Apache Tomcat 6.0.11
Apache Tomcat 6.0.7
Apache Tomcat 6.0.4
Apache Tomcat 6.0.15
Apache Tomcat 6.0.20
Apache Tomcat 6.0.10
Apache Tomcat 6.0.3
Apache Tomcat 6.0.9
Apache Tomcat 6.0.24
Apache Tomcat 6.0.17
Apache Tomcat 6.0.0
Apache Tomcat 6.0.14
Apache Tomcat 6.0.1
Apache Tomcat 6.0.12
Apache Tomcat 6.0.18
Apache Tomcat 6.0.5
Apache Tomcat 6.0.2
Apache Tomcat 6.0.13
Apache Tomcat 6.0.26
Apache Tomcat 6.0.19
Apache Tomcat 6.0.16
Apache Tomcat 6.0.8
1 EDB exploit available
5
CVSSv2
CVE-2011-4858
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many...
Apache Tomcat 6.0.33
Apache Tomcat 6.0.34
Apache Tomcat 6.0.26
Apache Tomcat 6.0.25
Apache Tomcat 6.0.30
Apache Tomcat 6.0.29
Apache Tomcat 6.0.21
Apache Tomcat 6.0.20
Apache Tomcat 6.0.13
Apache Tomcat 6.0.12
Apache Tomcat 6.0.5
Apache Tomcat 6.0.4
Apache Tomcat 7.0.19
Apache Tomcat 7.0.18
Apache Tomcat 7.0.11
Apache Tomcat 7.0.10
Apache Tomcat 7.0.3
Apache Tomcat 7.0.2
Apache Tomcat 5.5.35
Apache Tomcat 6.0.28
Apache Tomcat 6.0.27
Apache Tomcat 6.0.19
Apache Tomcat 6.0.18
Apache Tomcat 6.0.11
Apache Tomcat 6.0.10
Apache Tomcat 6.0.3
Apache Tomcat 6.0.2
Apache Tomcat 7.0.17
Apache Tomcat 7.0.16
Apache Tomcat 7.0.9
Apache Tomcat 7.0.8
Apache Tomcat 7.0.1
Apache Tomcat 7.0.0
Apache Tomcat 6.0.17
Apache Tomcat 6.0.16
Apache Tomcat 6.0.9
Apache Tomcat 6.0.8
Apache Tomcat 6.0.1
Apache Tomcat 6.0.0
Apache Tomcat 7.0.15
Apache Tomcat 7.0.14
Apache Tomcat 7.0.7
Apache Tomcat 7.0.6
Apache Tomcat 6.0.32
Apache Tomcat 6.0.31
Apache Tomcat 6.0.24
Apache Tomcat 6.0.23
Apache Tomcat 6.0.22
Apache Tomcat 6.0.15
Apache Tomcat 6.0.14
Apache Tomcat 6.0.7
Apache Tomcat 6.0.6
Apache Tomcat 7.0.22
Apache Tomcat 7.0.21
Apache Tomcat 7.0.20
Apache Tomcat 7.0.13
Apache Tomcat 7.0.12
Apache Tomcat 7.0.5
Apache Tomcat 7.0.4
1 EDB exploit available
1 Metasploit module available
1 Github repository available
2.6
CVSSv2
CVE-2012-4534
org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during...
Apache Tomcat 6.0.15
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
Apache Tomcat 6.0.33
Apache Tomcat 6.0.14
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 6.0.29
Apache Tomcat 6.0.2
Apache Tomcat 6.0.1
Apache Tomcat 6.0.27
Apache Tomcat 6.0.3
Apache Tomcat 6.0.12
Apache Tomcat 6.0.11
Apache Tomcat 6.0.4
Apache Tomcat 6.0.0
Apache Tomcat 6.0.32
Apache Tomcat 6.0.13
Apache Tomcat 6.0.19
Apache Tomcat 6.0.16
Apache Tomcat 6.0.17
Apache Tomcat 6.0.18
Apache Tomcat 6.0.26
Apache Tomcat 6.0.10
Apache Tomcat 6.0.20
Apache Tomcat 6.0.30
Apache Tomcat 6.0
Apache Tomcat 6.0.35
Apache Tomcat 6.0.28
Apache Tomcat 6.0.5
Apache Tomcat 6.0.24
Apache Tomcat 6.0.31
Apache Tomcat 7.0.5
Apache Tomcat 7.0.6
Apache Tomcat 7.0.21
Apache Tomcat 7.0.17
Apache Tomcat 7.0.14
Apache Tomcat 7.0.3
Apache Tomcat 7.0.12
Apache Tomcat 7.0.8
Apache Tomcat 7.0.23
Apache Tomcat 7.0.2
Apache Tomcat 7.0.0
Apache Tomcat 7.0.16
Apache Tomcat 7.0.7
Apache Tomcat 7.0.18
Apache Tomcat 7.0.15
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
Apache Tomcat 7.0.4
Apache Tomcat 7.0.25
Apache Tomcat 7.0.13
Apache Tomcat 7.0.1
Apache Tomcat 7.0.20
Apache Tomcat 7.0.19
Apache Tomcat 7.0.22
Apache Tomcat 7.0.9
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-41831
arbitrary code
LFI
CVE-2023-1536
CVE-2023-0175
XML external entity
CVE-2023-1515
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »