Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache tomcat vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2017-15706
As part of the fix for bug 61201, the documentation for Apache Tomcat 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47 and 7.0.79 to 7.0.82 included an updated description of the search algorithm used by the CGI Servlet to identify which script to execute. The update was no...
Apache Tomcat
Apache Tomcat 9.0.1
Apache Tomcat 9.0.0
8.1
CVSSv3
CVE-2017-12617
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a...
Apache Tomcat 7.0.2
Apache Tomcat 8.0.4
Apache Tomcat 8.0.10
Apache Tomcat 7.0.49
Apache Tomcat 8.0.30
Apache Tomcat 8.0.44
Apache Tomcat 7.0.12
Apache Tomcat 7.0.62
Apache Tomcat 8.0.17
Apache Tomcat 7.0.20
Apache Tomcat 8.0.7
Apache Tomcat 7.0.34
Apache Tomcat 8.0.26
Apache Tomcat 7.0.58
Apache Tomcat 8.5.2
Apache Tomcat 7.0.8
Apache Tomcat 7.0.55
Apache Tomcat 8.5.9
Apache Tomcat 8.5.4
Apache Tomcat 7.0.1
Apache Tomcat 7.0.5
Apache Tomcat 8.0.40
2 EDB exploits
21 Github repositories
5.3
CVSSv3
CVE-2017-13990
An information leakage vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version before 6.9.1c Patch 4 or 6.11.0 Patch 1, allows disclosure of Apache Tomcat application server version.
Hp Arcsight Enterprise Security Manager 6.8
Hp Arcsight Enterprise Security Manager 6.5
Hp Arcsight Enterprise Security Manager 6.0
Hp Arcsight Enterprise Security Manager 6.11.0
Hp Arcsight Enterprise Security Manager 6.0c
Hp Arcsight Enterprise Security Manager 6.5c
Hp Arcsight Enterprise Security Manager 6.8c
Hp Arcsight Enterprise Security Manager 6.9.0c
Hp Arcsight Enterprise Security Manager 6.9.1c
Hp Arcsight Enterprise Security Manager Express 6.11.0
Hp Arcsight Enterprise Security Manager Express 6.8
Hp Arcsight Enterprise Security Manager Express 6.8c
Hp Arcsight Enterprise Security Manager Express 6.5c
Hp Arcsight Enterprise Security Manager Express 6.5
Hp Arcsight Enterprise Security Manager Express 6.0c
Hp Arcsight Enterprise Security Manager Express 6.0
Hp Arcsight Enterprise Security Manager Express 6.9.1c
Hp Arcsight Enterprise Security Manager Express 6.9.0
7.5
CVSSv3
CVE-2017-12616
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
Apache Tomcat 7.0.2
Apache Tomcat 7.0.49
Apache Tomcat 7.0.12
Apache Tomcat 7.0.62
Apache Tomcat 7.0.20
Apache Tomcat 7.0.34
Apache Tomcat 7.0.58
Apache Tomcat 7.0.8
Apache Tomcat 7.0.55
Apache Tomcat 7.0.1
Apache Tomcat 7.0.5
Apache Tomcat 7.0.51
Apache Tomcat 7.0.4
Apache Tomcat 7.0.63
Apache Tomcat 7.0.22
Apache Tomcat 7.0.39
Apache Tomcat 7.0.26
Apache Tomcat 7.0.46
Apache Tomcat 7.0.72
Apache Tomcat 7.0.76
Apache Tomcat 7.0.71
Apache Tomcat 7.0.28
2 Github repositories
8.1
CVSSv3
CVE-2017-12615
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and a...
Apache Tomcat 7.0
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 7.0.4
Apache Tomcat 7.0.5
Apache Tomcat 7.0.6
Apache Tomcat 7.0.7
Apache Tomcat 7.0.8
Apache Tomcat 7.0.9
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
Apache Tomcat 7.0.12
Apache Tomcat 7.0.13
Apache Tomcat 7.0.14
Apache Tomcat 7.0.15
Apache Tomcat 7.0.16
Apache Tomcat 7.0.17
Apache Tomcat 7.0.18
Apache Tomcat 7.0.19
Apache Tomcat 7.0.20
1 EDB exploit
17 Github repositories
1 Article
7.5
CVSSv3
CVE-2017-7675
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.
Apache Tomcat 8.5.2
Apache Tomcat 8.5.9
Apache Tomcat 8.5.4
Apache Tomcat 8.5.0
Apache Tomcat 8.5.15
Apache Tomcat 8.5.10
Apache Tomcat 8.5.13
Apache Tomcat 8.5.14
Apache Tomcat 8.5.5
Apache Tomcat 8.5.3
Apache Tomcat 8.5.6
Apache Tomcat 8.5.7
Apache Tomcat 8.5.8
Apache Tomcat 8.5.12
Apache Tomcat 8.5.11
Apache Tomcat 8.5.1
Apache Tomcat 9.0.0
7.5
CVSSv3
CVE-2017-7683
Apache OpenMeetings 1.0.0 displays Tomcat version and detailed error stack trace, which is not secure.
Apache Openmeetings 3.0.6
Apache Openmeetings 3.0.7
Apache Openmeetings 3.1.0
Apache Openmeetings 3.1.1
Apache Openmeetings 3.1.2
Apache Openmeetings 2.1.1
Apache Openmeetings 2.2.0
Apache Openmeetings 3.0.0
Apache Openmeetings 3.0.1
Apache Openmeetings 3.2.1
Apache Openmeetings 2.0
Apache Openmeetings 3.0.3
Apache Openmeetings 3.0.5
Apache Openmeetings 3.1.4
Apache Openmeetings 3.2.0
Apache Openmeetings 1.0.0
Apache Openmeetings 2.1
Apache Openmeetings 3.0.2
Apache Openmeetings 3.0.4
Apache Openmeetings 3.1.3
Apache Openmeetings 3.1.5
7.5
CVSSv3
CVE-2017-5664
The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error pag...
Apache Tomcat 7.0.2
Apache Tomcat 7.0.49
Apache Tomcat 7.0.12
Apache Tomcat 7.0.62
Apache Tomcat 7.0.20
Apache Tomcat 7.0.34
Apache Tomcat 7.0.58
Apache Tomcat 7.0.8
Apache Tomcat 7.0.55
Apache Tomcat 7.0.1
Apache Tomcat 7.0.5
Apache Tomcat 7.0.51
Apache Tomcat 7.0.4
Apache Tomcat 7.0.63
Apache Tomcat 7.0.22
Apache Tomcat 7.0.39
Apache Tomcat 7.0.26
Apache Tomcat 7.0.46
Apache Tomcat 7.0.72
Apache Tomcat 7.0.76
Apache Tomcat 7.0.71
Apache Tomcat 7.0.28
7.5
CVSSv3
CVE-2017-5650
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These wait...
Apache Tomcat 8.5.2
Apache Tomcat 8.5.9
Apache Tomcat 8.5.4
Apache Tomcat 8.5.0
Apache Tomcat 8.5.10
Apache Tomcat 8.5.5
Apache Tomcat 8.5.3
Apache Tomcat 8.5.6
Apache Tomcat 8.5.7
Apache Tomcat 8.5.8
Apache Tomcat 8.5.12
Apache Tomcat 8.5.11
Apache Tomcat 8.5.1
Apache Tomcat 9.0.0
9.8
CVSSv3
CVE-2017-5651
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This ...
Apache Tomcat 8.5.2
Apache Tomcat 8.5.9
Apache Tomcat 8.5.4
Apache Tomcat 8.5.0
Apache Tomcat 8.5.10
Apache Tomcat 8.5.5
Apache Tomcat 8.5.3
Apache Tomcat 8.5.6
Apache Tomcat 8.5.7
Apache Tomcat 8.5.8
Apache Tomcat 8.5.12
Apache Tomcat 8.5.11
Apache Tomcat 8.5.1
Apache Tomcat 9.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »