Vulmon
Recent Vulnerabilities
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
By Recent Activity
apache tomcat vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2017-15698
When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for...
Apache Tomcat Native
Debian Debian Linux 8.0
Debian Debian Linux 9.0
5
CVSSv2
CVE-2017-15706
As part of the fix for bug 61201, the documentation for Apache Tomcat 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47 and 7.0.79 to 7.0.82 included an updated description of the search algorithm used by the CGI Servlet to identify which script to execute. The update was...
Apache Tomcat
Apache Tomcat 9.0.0
Apache Tomcat 9.0.1
10
CVSSv2
CVE-2015-7501
Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform...
Redhat Data Grid 6.0.0
Redhat Jboss A-mq 6.0.0
Redhat Jboss Bpm Suite 6.0.0
Redhat Jboss Data Virtualization 5.0.0
Redhat Jboss Data Virtualization 6.0.0
Redhat Jboss Enterprise Application Platform 4.3.0
Redhat Jboss Enterprise Application Platform 5.0.0
Redhat Jboss Enterprise Application Platform 6.0.0
Redhat Jboss Enterprise Brms Platform 5.0.0
Redhat Jboss Enterprise Brms Platform 6.0.0
Redhat Jboss Enterprise Soa Platform 5.0.0
Redhat Jboss Enterprise Web Server 3.0.0
Redhat Jboss Fuse 6.0.0
Redhat Jboss Fuse Service Works 6.0
Redhat Jboss Operations Network 3.0
Redhat Jboss Portal 6.0.0
Redhat Openshift 3.0
Redhat Subscription Asset Manager 1.3.0
Redhat Xpaas 3.0.0
37 Github repositories available
6.8
CVSSv2
CVE-2017-12617
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via...
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 7.0.4
Apache Tomcat 7.0.5
Apache Tomcat 7.0.6
Apache Tomcat 7.0.7
Apache Tomcat 7.0.8
Apache Tomcat 7.0.9
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
Apache Tomcat 7.0.12
Apache Tomcat 7.0.13
Apache Tomcat 7.0.14
Apache Tomcat 7.0.15
Apache Tomcat 7.0.16
Apache Tomcat 7.0.17
Apache Tomcat 7.0.18
Apache Tomcat 7.0.19
Apache Tomcat 7.0.20
Apache Tomcat 7.0.21
Apache Tomcat 7.0.22
Apache Tomcat 7.0.23
Apache Tomcat 7.0.24
Apache Tomcat 7.0.25
Apache Tomcat 7.0.26
Apache Tomcat 7.0.27
Apache Tomcat 7.0.28
Apache Tomcat 7.0.29
Apache Tomcat 7.0.30
Apache Tomcat 7.0.31
Apache Tomcat 7.0.32
Apache Tomcat 7.0.33
Apache Tomcat 7.0.34
Apache Tomcat 7.0.35
Apache Tomcat 7.0.36
Apache Tomcat 7.0.37
Apache Tomcat 7.0.38
Apache Tomcat 7.0.39
Apache Tomcat 7.0.40
Apache Tomcat 7.0.41
Apache Tomcat 7.0.42
Apache Tomcat 7.0.43
Apache Tomcat 7.0.44
Apache Tomcat 7.0.45
Apache Tomcat 7.0.46
Apache Tomcat 7.0.47
Apache Tomcat 7.0.48
Apache Tomcat 7.0.49
Apache Tomcat 7.0.50
Apache Tomcat 7.0.51
Apache Tomcat 7.0.54
Apache Tomcat 7.0.55
Apache Tomcat 7.0.56
Apache Tomcat 7.0.57
Apache Tomcat 7.0.58
Apache Tomcat 7.0.59
Apache Tomcat 7.0.60
Apache Tomcat 7.0.61
Apache Tomcat 7.0.62
Apache Tomcat 7.0.63
Apache Tomcat 7.0.64
Apache Tomcat 7.0.65
Apache Tomcat 7.0.66
Apache Tomcat 7.0.67
Apache Tomcat 7.0.68
Apache Tomcat 7.0.69
Apache Tomcat 7.0.70
Apache Tomcat 7.0.71
Apache Tomcat 7.0.72
Apache Tomcat 7.0.73
Apache Tomcat 7.0.74
Apache Tomcat 7.0.75
Apache Tomcat 7.0.76
Apache Tomcat 7.0.77
Apache Tomcat 7.0.79
Apache Tomcat 7.0.80
Apache Tomcat 7.0.81
Apache Tomcat 8.0.0
Apache Tomcat 8.0.1
Apache Tomcat 8.0.2
Apache Tomcat 8.0.4
Apache Tomcat 8.0.6
Apache Tomcat 8.0.7
Apache Tomcat 8.0.9
Apache Tomcat 8.0.10
Apache Tomcat 8.0.11
Apache Tomcat 8.0.12
Apache Tomcat 8.0.13
Apache Tomcat 8.0.14
Apache Tomcat 8.0.15
Apache Tomcat 8.0.16
Apache Tomcat 8.0.17
Apache Tomcat 8.0.18
Apache Tomcat 8.0.19
Apache Tomcat 8.0.20
Apache Tomcat 8.0.21
Apache Tomcat 8.0.22
Apache Tomcat 8.0.23
Apache Tomcat 8.0.24
Apache Tomcat 8.0.25
Apache Tomcat 8.0.26
Apache Tomcat 8.0.27
Apache Tomcat 8.0.28
Apache Tomcat 8.0.29
Apache Tomcat 8.0.30
Apache Tomcat 8.0.31
Apache Tomcat 8.0.32
Apache Tomcat 8.0.33
Apache Tomcat 8.0.34
Apache Tomcat 8.0.35
Apache Tomcat 8.0.36
Apache Tomcat 8.0.37
Apache Tomcat 8.0.38
Apache Tomcat 8.0.39
Apache Tomcat 8.0.40
Apache Tomcat 8.0.41
Apache Tomcat 8.0.42
Apache Tomcat 8.0.43
Apache Tomcat 8.0.44
Apache Tomcat 8.0.45
Apache Tomcat 8.0.46
Apache Tomcat 8.5.0
Apache Tomcat 8.5.1
Apache Tomcat 8.5.2
Apache Tomcat 8.5.3
Apache Tomcat 8.5.4
Apache Tomcat 8.5.5
Apache Tomcat 8.5.6
Apache Tomcat 8.5.7
Apache Tomcat 8.5.8
Apache Tomcat 8.5.9
Apache Tomcat 8.5.10
Apache Tomcat 8.5.11
Apache Tomcat 8.5.12
Apache Tomcat 8.5.13
Apache Tomcat 8.5.14
Apache Tomcat 8.5.15
Apache Tomcat 8.5.16
Apache Tomcat 8.5.17
Apache Tomcat 8.5.18
Apache Tomcat 8.5.19
Apache Tomcat 8.5.20
Apache Tomcat 8.5.21
Apache Tomcat 8.5.22
Apache Tomcat 9.0.0
2 EDB exploits available
1 Metasploit module available
49 Github repositories available
5
CVSSv2
CVE-2017-13990
An information leakage vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows disclosure of Apache Tomcat application server version....
Hp Arcsight Enterprise Security Manager 6.0
Hp Arcsight Enterprise Security Manager 6.0c
Hp Arcsight Enterprise Security Manager 6.5
Hp Arcsight Enterprise Security Manager 6.5c
Hp Arcsight Enterprise Security Manager 6.8
Hp Arcsight Enterprise Security Manager 6.8c
Hp Arcsight Enterprise Security Manager 6.9.0c
Hp Arcsight Enterprise Security Manager 6.9.1c
Hp Arcsight Enterprise Security Manager 6.11.0
Hp Arcsight Enterprise Security Manager Express 6.0
Hp Arcsight Enterprise Security Manager Express 6.0c
Hp Arcsight Enterprise Security Manager Express 6.5
Hp Arcsight Enterprise Security Manager Express 6.5c
Hp Arcsight Enterprise Security Manager Express 6.8
Hp Arcsight Enterprise Security Manager Express 6.8c
Hp Arcsight Enterprise Security Manager Express 6.9.0
Hp Arcsight Enterprise Security Manager Express 6.9.1c
Hp Arcsight Enterprise Security Manager Express 6.11.0
5
CVSSv2
CVE-2017-12616
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request....
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 7.0.4
Apache Tomcat 7.0.5
Apache Tomcat 7.0.6
Apache Tomcat 7.0.7
Apache Tomcat 7.0.8
Apache Tomcat 7.0.9
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
Apache Tomcat 7.0.12
Apache Tomcat 7.0.13
Apache Tomcat 7.0.14
Apache Tomcat 7.0.15
Apache Tomcat 7.0.16
Apache Tomcat 7.0.17
Apache Tomcat 7.0.18
Apache Tomcat 7.0.19
Apache Tomcat 7.0.20
Apache Tomcat 7.0.21
Apache Tomcat 7.0.22
Apache Tomcat 7.0.23
Apache Tomcat 7.0.24
Apache Tomcat 7.0.25
Apache Tomcat 7.0.26
Apache Tomcat 7.0.27
Apache Tomcat 7.0.28
Apache Tomcat 7.0.29
Apache Tomcat 7.0.30
Apache Tomcat 7.0.31
Apache Tomcat 7.0.32
Apache Tomcat 7.0.33
Apache Tomcat 7.0.34
Apache Tomcat 7.0.35
Apache Tomcat 7.0.36
Apache Tomcat 7.0.37
Apache Tomcat 7.0.38
Apache Tomcat 7.0.39
Apache Tomcat 7.0.40
Apache Tomcat 7.0.41
Apache Tomcat 7.0.42
Apache Tomcat 7.0.43
Apache Tomcat 7.0.44
Apache Tomcat 7.0.45
Apache Tomcat 7.0.46
Apache Tomcat 7.0.47
Apache Tomcat 7.0.48
Apache Tomcat 7.0.49
Apache Tomcat 7.0.50
Apache Tomcat 7.0.51
Apache Tomcat 7.0.54
Apache Tomcat 7.0.55
Apache Tomcat 7.0.56
Apache Tomcat 7.0.57
Apache Tomcat 7.0.58
Apache Tomcat 7.0.59
Apache Tomcat 7.0.60
Apache Tomcat 7.0.61
Apache Tomcat 7.0.62
Apache Tomcat 7.0.63
Apache Tomcat 7.0.64
Apache Tomcat 7.0.65
Apache Tomcat 7.0.66
Apache Tomcat 7.0.67
Apache Tomcat 7.0.68
Apache Tomcat 7.0.69
Apache Tomcat 7.0.70
Apache Tomcat 7.0.71
Apache Tomcat 7.0.72
Apache Tomcat 7.0.73
Apache Tomcat 7.0.74
Apache Tomcat 7.0.75
Apache Tomcat 7.0.76
Apache Tomcat 7.0.77
Apache Tomcat 7.0.79
Apache Tomcat 7.0.80
3 Github repositories available
6.8
CVSSv2
CVE-2017-12615
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and...
Apache Tomcat 7.0
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 7.0.4
Apache Tomcat 7.0.5
Apache Tomcat 7.0.6
Apache Tomcat 7.0.7
Apache Tomcat 7.0.8
Apache Tomcat 7.0.9
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
Apache Tomcat 7.0.12
Apache Tomcat 7.0.13
Apache Tomcat 7.0.14
Apache Tomcat 7.0.15
Apache Tomcat 7.0.16
Apache Tomcat 7.0.17
Apache Tomcat 7.0.18
Apache Tomcat 7.0.19
Apache Tomcat 7.0.20
Apache Tomcat 7.0.21
Apache Tomcat 7.0.22
Apache Tomcat 7.0.23
Apache Tomcat 7.0.24
Apache Tomcat 7.0.25
Apache Tomcat 7.0.26
Apache Tomcat 7.0.27
Apache Tomcat 7.0.28
Apache Tomcat 7.0.29
Apache Tomcat 7.0.30
Apache Tomcat 7.0.31
Apache Tomcat 7.0.32
Apache Tomcat 7.0.33
Apache Tomcat 7.0.34
Apache Tomcat 7.0.35
Apache Tomcat 7.0.36
Apache Tomcat 7.0.37
Apache Tomcat 7.0.38
Apache Tomcat 7.0.39
Apache Tomcat 7.0.40
Apache Tomcat 7.0.41
Apache Tomcat 7.0.42
Apache Tomcat 7.0.43
Apache Tomcat 7.0.44
Apache Tomcat 7.0.45
Apache Tomcat 7.0.46
Apache Tomcat 7.0.47
Apache Tomcat 7.0.48
Apache Tomcat 7.0.49
Apache Tomcat 7.0.50
Apache Tomcat 7.0.51
Apache Tomcat 7.0.54
Apache Tomcat 7.0.55
Apache Tomcat 7.0.56
Apache Tomcat 7.0.57
Apache Tomcat 7.0.58
Apache Tomcat 7.0.59
Apache Tomcat 7.0.60
Apache Tomcat 7.0.61
Apache Tomcat 7.0.62
Apache Tomcat 7.0.63
Apache Tomcat 7.0.64
Apache Tomcat 7.0.65
Apache Tomcat 7.0.66
Apache Tomcat 7.0.67
Apache Tomcat 7.0.68
Apache Tomcat 7.0.69
Apache Tomcat 7.0.70
Apache Tomcat 7.0.71
Apache Tomcat 7.0.72
Apache Tomcat 7.0.73
Apache Tomcat 7.0.74
Apache Tomcat 7.0.75
Apache Tomcat 7.0.76
Apache Tomcat 7.0.77
Apache Tomcat 7.0.79
1 EDB exploit available
30 Github repositories available
1 Article available
4.3
CVSSv2
CVE-2017-7674
The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances....
Apache Tomcat 7.0.41
Apache Tomcat 7.0.42
Apache Tomcat 7.0.43
Apache Tomcat 7.0.44
Apache Tomcat 7.0.45
Apache Tomcat 7.0.46
Apache Tomcat 7.0.47
Apache Tomcat 7.0.48
Apache Tomcat 7.0.49
Apache Tomcat 7.0.50
Apache Tomcat 7.0.52
Apache Tomcat 7.0.53
Apache Tomcat 7.0.54
Apache Tomcat 7.0.55
Apache Tomcat 7.0.56
Apache Tomcat 7.0.57
Apache Tomcat 7.0.58
Apache Tomcat 7.0.59
Apache Tomcat 7.0.60
Apache Tomcat 7.0.61
Apache Tomcat 7.0.62
Apache Tomcat 7.0.63
Apache Tomcat 7.0.64
Apache Tomcat 7.0.65
Apache Tomcat 7.0.66
Apache Tomcat 7.0.67
Apache Tomcat 7.0.68
Apache Tomcat 7.0.69
Apache Tomcat 7.0.70
Apache Tomcat 7.0.71
Apache Tomcat 7.0.72
Apache Tomcat 7.0.73
Apache Tomcat 7.0.74
Apache Tomcat 7.0.75
Apache Tomcat 7.0.76
Apache Tomcat 7.0.77
Apache Tomcat 7.0.78
Apache Tomcat 8.0
Apache Tomcat 8.0.0
Apache Tomcat 8.0.1
Apache Tomcat 8.0.2
Apache Tomcat 8.0.3
Apache Tomcat 8.0.4
Apache Tomcat 8.0.5
Apache Tomcat 8.0.6
Apache Tomcat 8.0.7
Apache Tomcat 8.0.8
Apache Tomcat 8.0.9
Apache Tomcat 8.0.10
Apache Tomcat 8.0.11
Apache Tomcat 8.0.12
Apache Tomcat 8.0.13
Apache Tomcat 8.0.14
Apache Tomcat 8.0.15
Apache Tomcat 8.0.16
Apache Tomcat 8.0.17
Apache Tomcat 8.0.18
Apache Tomcat 8.0.19
Apache Tomcat 8.0.20
Apache Tomcat 8.0.21
Apache Tomcat 8.0.22
Apache Tomcat 8.0.23
Apache Tomcat 8.0.24
Apache Tomcat 8.0.25
Apache Tomcat 8.0.26
Apache Tomcat 8.0.27
Apache Tomcat 8.0.28
Apache Tomcat 8.0.29
Apache Tomcat 8.0.30
Apache Tomcat 8.0.31
Apache Tomcat 8.0.32
Apache Tomcat 8.0.33
Apache Tomcat 8.0.34
Apache Tomcat 8.0.35
Apache Tomcat 8.0.36
Apache Tomcat 8.0.37
Apache Tomcat 8.0.38
Apache Tomcat 8.0.39
Apache Tomcat 8.0.40
Apache Tomcat 8.0.41
Apache Tomcat 8.0.42
Apache Tomcat 8.0.43
Apache Tomcat 8.0.44
Apache Tomcat 8.5.0
Apache Tomcat 8.5.1
Apache Tomcat 8.5.2
Apache Tomcat 8.5.3
Apache Tomcat 8.5.4
Apache Tomcat 8.5.5
Apache Tomcat 8.5.6
Apache Tomcat 8.5.7
Apache Tomcat 8.5.8
Apache Tomcat 8.5.9
Apache Tomcat 8.5.10
Apache Tomcat 8.5.11
Apache Tomcat 8.5.12
Apache Tomcat 8.5.13
Apache Tomcat 8.5.14
Apache Tomcat 8.5.15
Apache Tomcat 9.0.0
1 Github repository available
5
CVSSv2
CVE-2016-6796
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet....
Apache Tomcat 6.0.0
Apache Tomcat 6.0.1
Apache Tomcat 6.0.2
Apache Tomcat 6.0.3
Apache Tomcat 6.0.4
Apache Tomcat 6.0.5
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
Apache Tomcat 6.0.10
Apache Tomcat 6.0.11
Apache Tomcat 6.0.12
Apache Tomcat 6.0.13
Apache Tomcat 6.0.14
Apache Tomcat 6.0.15
Apache Tomcat 6.0.16
Apache Tomcat 6.0.17
Apache Tomcat 6.0.18
Apache Tomcat 6.0.19
Apache Tomcat 6.0.20
Apache Tomcat 6.0.21
Apache Tomcat 6.0.22
Apache Tomcat 6.0.23
Apache Tomcat 6.0.24
Apache Tomcat 6.0.25
Apache Tomcat 6.0.26
Apache Tomcat 6.0.27
Apache Tomcat 6.0.28
Apache Tomcat 6.0.29
Apache Tomcat 6.0.30
Apache Tomcat 6.0.31
Apache Tomcat 6.0.32
Apache Tomcat 6.0.33
Apache Tomcat 6.0.34
Apache Tomcat 6.0.35
Apache Tomcat 6.0.36
Apache Tomcat 6.0.37
Apache Tomcat 6.0.38
Apache Tomcat 6.0.39
Apache Tomcat 6.0.40
Apache Tomcat 6.0.41
Apache Tomcat 6.0.42
Apache Tomcat 6.0.43
Apache Tomcat 6.0.44
Apache Tomcat 6.0.45
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 7.0.4
Apache Tomcat 7.0.5
Apache Tomcat 7.0.6
Apache Tomcat 7.0.7
Apache Tomcat 7.0.8
Apache Tomcat 7.0.9
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
Apache Tomcat 7.0.12
Apache Tomcat 7.0.13
Apache Tomcat 7.0.14
Apache Tomcat 7.0.15
Apache Tomcat 7.0.16
Apache Tomcat 7.0.17
Apache Tomcat 7.0.18
Apache Tomcat 7.0.19
Apache Tomcat 7.0.20
Apache Tomcat 7.0.21
Apache Tomcat 7.0.22
Apache Tomcat 7.0.23
Apache Tomcat 7.0.24
Apache Tomcat 7.0.25
Apache Tomcat 7.0.26
Apache Tomcat 7.0.27
Apache Tomcat 7.0.28
Apache Tomcat 7.0.29
Apache Tomcat 7.0.30
Apache Tomcat 7.0.31
Apache Tomcat 7.0.32
Apache Tomcat 7.0.33
Apache Tomcat 7.0.34
Apache Tomcat 7.0.35
Apache Tomcat 7.0.36
Apache Tomcat 7.0.37
Apache Tomcat 7.0.38
Apache Tomcat 7.0.39
Apache Tomcat 7.0.40
Apache Tomcat 7.0.41
Apache Tomcat 7.0.42
Apache Tomcat 7.0.43
Apache Tomcat 7.0.44
Apache Tomcat 7.0.45
Apache Tomcat 7.0.46
Apache Tomcat 7.0.47
Apache Tomcat 7.0.48
Apache Tomcat 7.0.49
Apache Tomcat 7.0.50
Apache Tomcat 7.0.52
Apache Tomcat 7.0.53
Apache Tomcat 7.0.54
Apache Tomcat 7.0.55
Apache Tomcat 7.0.56
Apache Tomcat 7.0.57
Apache Tomcat 7.0.58
Apache Tomcat 7.0.59
Apache Tomcat 7.0.60
Apache Tomcat 7.0.61
Apache Tomcat 7.0.62
Apache Tomcat 7.0.63
Apache Tomcat 7.0.64
Apache Tomcat 7.0.65
Apache Tomcat 7.0.66
Apache Tomcat 7.0.67
Apache Tomcat 7.0.68
Apache Tomcat 7.0.69
Apache Tomcat 7.0.70
Apache Tomcat 8.0
Apache Tomcat 8.0.0
Apache Tomcat 8.0.1
Apache Tomcat 8.0.2
Apache Tomcat 8.0.3
Apache Tomcat 8.0.4
Apache Tomcat 8.0.5
Apache Tomcat 8.0.6
Apache Tomcat 8.0.7
Apache Tomcat 8.0.8
Apache Tomcat 8.0.9
Apache Tomcat 8.0.10
Apache Tomcat 8.0.11
Apache Tomcat 8.0.12
Apache Tomcat 8.0.13
Apache Tomcat 8.0.14
Apache Tomcat 8.0.15
Apache Tomcat 8.0.16
Apache Tomcat 8.0.17
Apache Tomcat 8.0.18
Apache Tomcat 8.0.19
Apache Tomcat 8.0.20
Apache Tomcat 8.0.21
Apache Tomcat 8.0.22
Apache Tomcat 8.0.23
Apache Tomcat 8.0.24
Apache Tomcat 8.0.25
Apache Tomcat 8.0.26
Apache Tomcat 8.0.27
Apache Tomcat 8.0.28
Apache Tomcat 8.0.29
Apache Tomcat 8.0.30
Apache Tomcat 8.0.31
Apache Tomcat 8.0.32
Apache Tomcat 8.0.33
Apache Tomcat 8.0.34
Apache Tomcat 8.0.35
Apache Tomcat 8.0.36
Apache Tomcat 8.5.0
Apache Tomcat 8.5.1
Apache Tomcat 8.5.2
Apache Tomcat 8.5.3
Apache Tomcat 8.5.4
Apache Tomcat 9.0.0
5
CVSSv2
CVE-2017-7675
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL....
Apache Tomcat 8.5.0
Apache Tomcat 8.5.1
Apache Tomcat 8.5.2
Apache Tomcat 8.5.3
Apache Tomcat 8.5.4
Apache Tomcat 8.5.5
Apache Tomcat 8.5.6
Apache Tomcat 8.5.7
Apache Tomcat 8.5.8
Apache Tomcat 8.5.9
Apache Tomcat 8.5.10
Apache Tomcat 8.5.11
Apache Tomcat 8.5.12
Apache Tomcat 8.5.13
Apache Tomcat 8.5.14
Apache Tomcat 8.5.15
Apache Tomcat 9.0.0
1 Github repository available
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
TCP
CVE-2020-4865
CVE-2021-3297
CVE-2018-15473
CVE-2021-3317
CVE-2021-23240
denial of service
CVE-2020-16107
« PREV
1
2
3
4
5
6
7
8
9
NEXT »