[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26496 Download | Alert*

The host is installed with Apache Tomcat 6.0.x to 6.0.47, 7.x to 7.0.72, 8.0.0 to 8.0.38, 8.5.x to 8.5.6 or 9.0.0.M1 to 9.0.0.M11 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which does not properly handle certain inconsistent HTTP request headers. Successful exploitation allows remote attackers to perform an XSS attack or obtain sensitive information ...

The host is installed with Apache Tomcat 8.5.7 to 8.5.9 or 9.0.0.M11 to 9.0.0.M15 and is prone to an information disclosure vulnerability. A flaw is present in the reverse-proxy configurations, which fails to handle different requests. Successful exploitation allows remote attackers to read data that was intended to be associated with a different request.

The host is installed with Apache Tomcat 6.0 before 6.0.52, 7.x before 7.0.76, 8.x before 8.0.42, 8.5.x before 8.5.12 or 9.x before 9.0.0.M19 and is prone to an unspecified vulnerability. A flaw is present in the Application, which fails to handle pipelined requests. Successful exploitation could result in responses appearing to be sent for the wrong request. For example, a user agent that sent re ...

The host is installed with Apache Tomcat 8.5.x before 8.5.13 or 9.x before 9.0.0.M19 and is prone to an denial of service vulnerability. A flaw is present in the Application, which fails to handle an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. Successfu ...

The host is installed with Apache Tomcat 8.5.x before 8.5.13 or 9.x before 9.0.0.M19 and is prone to an denial of service vulnerability. A flaw is present in the Application, which fails to properly handle send file process. Successful exploitation could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up.

The host is installed with Apache Tomcat 7.x before 7.0.76, 8.x before 8.0.42, 8.5.x before 8.5.12 or 9.x before 9.0.0.M18 and is prone to an information disclosure vulnerability. A flaw is present in the Application, which did not use the appropriate facade object. Successful exploitation allows untrusted application to retain a reference to the request or response object and thereby access and/o ...

The host is installed with Apache Tomcat 7.x before 7.0.80 and is prone to a remote code execution vulnerability. A flaw is present in the readonly initialization parameter of the default servlet, when running with HTTP PUTs enabled. Successful exploitation allows attackers to upload a JSP file to the server via a specially crafted request.

The host is installed with Apache Tomcat 8.5.x to 8.5.6 or 9.x to 9.0.0.M11 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle an infinite loop if a header was received that was larger than the available buffer. Successful exploitation allows attackers to perform denial of service attack.

The host is installed with Apache Tomcat 8.5.x before 8.5.16 or 9.x before 9.0.0.M22 and is prone to a bypass directory traversal vulnerability. A flaw is present in the application which fails to handle a specially crafted URL. Successful exploitation allows attackers to bypass security constraints using a specially crafted URL.

The host is installed with Apache Tomcat 10.0.0-M1 through 10.0.0, 9.0.0.M1 through 9.0.41, 7.0.x through 7.0.107 or 8.5.x through 8.5.61 and is prone to a remote code execution vulnerability. A flaw is present in application, which fails to properly handle issues in PersistenceManager. On successful exploitation, attacker will be able to trigger remote code execution via deserialization of the fi ...


Pages:      Start    1284    1285    1286    1287    1288    1289    1290    1291    1292    1293    1294    1295    1296    1297    ..   2649

© SecPod Technologies