It exists that Tomcat did not properly validate the input length. An attacker could possibly use this to trigger an infinite loop, resulting in a denial of service. (CVE-2020-9494, CVE-2021-25329, CVE-2021-41079)
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache tomcat |
||
apache tomee 8.0.6 |
||
debian debian linux 9.0 |
||
debian debian linux 10.0 |
||
oracle agile plm 9.3.6 |
||
oracle communications cloud native core policy 1.14.0 |
||
oracle communications cloud native core service communication proxy 1.14.0 |
||
oracle communications diameter signaling router |
||
oracle communications instant messaging server 10.0.1.5.0 |
||
oracle communications policy management 12.5.0 |
||
oracle communications pricing design center 12.0.0.3.0 |
||
oracle communications session report manager |
||
oracle communications session route manager |
||
oracle graph server and client |
||
oracle healthcare translational research 4.1.0 |
||
oracle hospitality cruise shipboard property management system 20.1.0 |
||
oracle instantis enterprisetrack 17.1 |
||
oracle instantis enterprisetrack 17.2 |
||
oracle instantis enterprisetrack 17.3 |
||
oracle managed file transfer 12.2.1.3.0 |
||
oracle managed file transfer 12.2.1.4.0 |
||
oracle mysql enterprise monitor |
||
oracle sd-wan edge 9.0 |
||
oracle sd-wan edge 9.1 |
||
oracle secure global desktop 5.6 |
||
oracle utilities testing accelerator 6.0.0.1.1 |
||
oracle utilities testing accelerator 6.0.0.2.2 |
||
oracle utilities testing accelerator 6.0.0.3.1 |
||
mcafee epolicy orchestrator |
||
mcafee epolicy orchestrator 5.10.0 |