Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache tomcat 4.1.19 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2005-4836
The HTTP/1.1 connector in Apache Tomcat 4.1.15 up to and including 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote malicious users to read JSP source files and obtain sensitive information.
Apache Tomcat 4.1.15
Apache Tomcat 4.1.16
Apache Tomcat 4.1.17
Apache Tomcat 4.1.18
Apache Tomcat 4.1.19
Apache Tomcat 4.1.20
Apache Tomcat 4.1.21
Apache Tomcat 4.1.22
Apache Tomcat 4.1.23
Apache Tomcat 4.1.24
Apache Tomcat 4.1.25
Apache Tomcat 4.1.26
4.3
CVSSv2
CVE-2008-3271
Apache Tomcat 5.5.0 and 4.1.0 up to and including 4.1.31 allows remote malicious users to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable...
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.4
Apache Tomcat 4.1.5
Apache Tomcat 4.1.6
Apache Tomcat 4.1.7
Apache Tomcat 4.1.8
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.11
3.5
CVSSv2
CVE-2007-5461
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 up to and including 4.0.6, 4.1.0, 5.0.0, 5.5.0 up to and including 5.5.25, and 6.0.0 up to and including 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write...
Apache Tomcat 4.0.0
Apache Tomcat 4.0.1
Apache Tomcat 4.0.2
Apache Tomcat 4.0.3
Apache Tomcat 4.0.4
Apache Tomcat 4.0.5
Apache Tomcat 4.0.6
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.4
2 EDB exploits
4.3
CVSSv2
CVE-2009-0781
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 up to and including 4.1.39, 5.5.0 up to and including 5.5.27, and 6.0.0 up to and including 6.0.18 allows remote malicious users to inje...
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.4
Apache Tomcat 4.1.5
Apache Tomcat 4.1.6
Apache Tomcat 4.1.7
Apache Tomcat 4.1.8
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.11
5
CVSSv2
CVE-2008-2370
Apache Tomcat 4.1.0 up to and including 4.1.37, 5.5.0 up to and including 5.5.26, and 6.0.0 up to and including 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote malicious users to conduct dire...
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.4
Apache Tomcat 4.1.5
Apache Tomcat 4.1.6
Apache Tomcat 4.1.7
Apache Tomcat 4.1.8
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.11
1 EDB exploit
5
CVSSv2
CVE-2008-5515
Apache Tomcat 4.1.0 up to and including 4.1.39, 5.5.0 up to and including 5.5.27, 6.0.0 up to and including 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote maliciou...
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.10
Apache Tomcat 4.1.11
Apache Tomcat 4.1.12
Apache Tomcat 4.1.13
Apache Tomcat 4.1.14
Apache Tomcat 4.1.15
Apache Tomcat 4.1.16
Apache Tomcat 4.1.17
4.3
CVSSv2
CVE-2009-0580
Apache Tomcat 4.1.0 up to and including 4.1.39, 5.5.0 up to and including 5.5.27, and 6.0.0 up to and including 6.0.18, when FORM authentication is used, allows remote malicious users to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of pa...
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.4
Apache Tomcat 4.1.5
Apache Tomcat 4.1.6
Apache Tomcat 4.1.7
Apache Tomcat 4.1.8
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.11
1 EDB exploit
5
CVSSv2
CVE-2009-0033
Apache Tomcat 4.1.0 up to and including 4.1.39, 5.5.0 up to and including 5.5.27, and 6.0.0 up to and including 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote malicious users to cause a denial of service (application outage) via a crafted re...
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.4
Apache Tomcat 4.1.5
Apache Tomcat 4.1.6
Apache Tomcat 4.1.7
Apache Tomcat 4.1.8
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.11
7.5
CVSSv2
CVE-2009-3548
The Windows installer for Apache Tomcat 6.0.0 up to and including 6.0.20, 5.5.0 up to and including 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote malicious users to gain privileges.
Apache Tomcat 3.0
Apache Tomcat 3.1
Apache Tomcat 3.1.1
Apache Tomcat 3.2
Apache Tomcat 3.2.1
Apache Tomcat 3.2.2
Apache Tomcat 3.2.3
Apache Tomcat 3.2.4
Apache Tomcat 3.3
Apache Tomcat 3.3.1
Apache Tomcat 3.3.1a
Apache Tomcat 3.3.2
2 EDB exploits
1 Github repository
2.6
CVSSv2
CVE-2008-5519
The JK Connector (aka mod_jk) 1.2.0 up to and including 1.2.26 in Apache Tomcat allows remote malicious users to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included...
Apache Mod Jk 1.2
Apache Mod Jk 1.2.1
Apache Mod Jk 1.2.6
Apache Mod Jk 1.2.7
Apache Mod Jk 1.2.8
Apache Mod Jk 1.2.9
Apache Mod Jk 1.2.10
Apache Mod Jk 1.2.11
Apache Mod Jk 1.2.12
Apache Mod Jk 1.2.13
Apache Mod Jk 1.2.14
Apache Mod Jk 1.2.14.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
log injection
CVE-2024-42327
CVE-2024-53691
camera
CVE-2024-53810
CVE-2024-41649
logic flaw
CVE-2024-38921
CVE-2024-41713
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started