Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache tomcat 6.0.11 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2009-0580
Apache Tomcat 4.1.0 up to and including 4.1.39, 5.5.0 up to and including 5.5.27, and 6.0.0 up to and including 6.0.18, when FORM authentication is used, allows remote malicious users to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of pa...
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.4
Apache Tomcat 4.1.5
Apache Tomcat 4.1.6
Apache Tomcat 4.1.7
Apache Tomcat 4.1.8
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.11
1 EDB exploit
5
CVSSv2
CVE-2009-0033
Apache Tomcat 4.1.0 up to and including 4.1.39, 5.5.0 up to and including 5.5.27, and 6.0.0 up to and including 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote malicious users to cause a denial of service (application outage) via a crafted re...
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.4
Apache Tomcat 4.1.5
Apache Tomcat 4.1.6
Apache Tomcat 4.1.7
Apache Tomcat 4.1.8
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.11
7.5
CVSSv2
CVE-2011-3190
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 up to and including 7.0.20, 6.0.0 up to and including 6.0.33, 5.5.0 up to and including 5.5.33, and possibly other versions allow remote malicious users to spoof AJP requests, bypass authentication, and obtain ...
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 7.0.4
Apache Tomcat 7.0.5
Apache Tomcat 7.0.6
Apache Tomcat 7.0.7
Apache Tomcat 7.0.8
Apache Tomcat 7.0.9
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
4.3
CVSSv2
CVE-2007-3382
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote malicious users to cond...
Apache Tomcat 3.3
Apache Tomcat 3.3.1
Apache Tomcat 3.3.1a
Apache Tomcat 3.3.2
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.15
Apache Tomcat 4.1.24
1 EDB exploit
4.3
CVSSv2
CVE-2007-3385
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable se...
Apache Tomcat 3.3
Apache Tomcat 3.3.1
Apache Tomcat 3.3.1a
Apache Tomcat 3.3.2
Apache Tomcat 4.1.0
Apache Tomcat 4.1.1
Apache Tomcat 4.1.2
Apache Tomcat 4.1.3
Apache Tomcat 4.1.9
Apache Tomcat 4.1.10
Apache Tomcat 4.1.15
Apache Tomcat 4.1.24
7.8
CVSSv2
CVE-2014-0230
Apache Tomcat 6.x prior to 6.0.44, 7.x prior to 7.0.55, and 8.x prior to 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote malicious users to cause a denial of service (thread consumption...
Apache Tomcat 6.0.0
Apache Tomcat 6.0.1
Apache Tomcat 6.0.2
Apache Tomcat 6.0.3
Apache Tomcat 6.0.4
Apache Tomcat 6.0.5
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
Apache Tomcat 6.0.10
Apache Tomcat 6.0.11
6.4
CVSSv2
CVE-2014-0227
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x prior to 6.0.42, 7.x prior to 7.0.55, and 8.x prior to 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote malicious users to conduct H...
Apache Tomcat 6.0.0
Apache Tomcat 6.0.1
Apache Tomcat 6.0.2
Apache Tomcat 6.0.3
Apache Tomcat 6.0.4
Apache Tomcat 6.0.5
Apache Tomcat 6.0.6
Apache Tomcat 6.0.7
Apache Tomcat 6.0.8
Apache Tomcat 6.0.9
Apache Tomcat 6.0.10
Apache Tomcat 6.0.11
5
CVSSv2
CVE-2012-5885
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x prior to 5.5.36, 6.x prior to 6.0.36, and 7.x prior to 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count...
Apache Tomcat 5.5.0
Apache Tomcat 5.5.1
Apache Tomcat 5.5.2
Apache Tomcat 5.5.3
Apache Tomcat 5.5.4
Apache Tomcat 5.5.5
Apache Tomcat 5.5.6
Apache Tomcat 5.5.7
Apache Tomcat 5.5.8
Apache Tomcat 5.5.9
Apache Tomcat 5.5.10
Apache Tomcat 5.5.11
5
CVSSv2
CVE-2012-5886
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x prior to 5.5.36, 6.x prior to 6.0.36, and 7.x prior to 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote malicious users to bypass authentic...
Apache Tomcat 5.5.0
Apache Tomcat 5.5.1
Apache Tomcat 5.5.2
Apache Tomcat 5.5.3
Apache Tomcat 5.5.4
Apache Tomcat 5.5.5
Apache Tomcat 5.5.6
Apache Tomcat 5.5.7
Apache Tomcat 5.5.8
Apache Tomcat 5.5.9
Apache Tomcat 5.5.10
Apache Tomcat 5.5.11
5
CVSSv2
CVE-2012-5887
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x prior to 5.5.36, 6.x prior to 6.0.36, and 7.x prior to 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote malicio...
Apache Tomcat 5.5.0
Apache Tomcat 5.5.1
Apache Tomcat 5.5.2
Apache Tomcat 5.5.3
Apache Tomcat 5.5.4
Apache Tomcat 5.5.5
Apache Tomcat 5.5.6
Apache Tomcat 5.5.7
Apache Tomcat 5.5.8
Apache Tomcat 5.5.9
Apache Tomcat 5.5.10
Apache Tomcat 5.5.11
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-12326
CVE-2024-44852
XSS
privilege escalation
CSRF
CVE-2024-12115
CVE-2024-38925
CVE-2024-38144
CVE-2024-6387
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »