Show filters
50 Total Results
Displaying 21-30 of 50
Sort by:
Attacker Value
Unknown

CVE-2011-1184

Disclosure Date: January 14, 2012 (last updated October 04, 2023)
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.
0
Attacker Value
Unknown

CVE-2011-5062

Disclosure Date: January 14, 2012 (last updated October 04, 2023)
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184.
0
Attacker Value
Unknown

CVE-2011-4858

Disclosure Date: January 05, 2012 (last updated October 04, 2023)
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
0
Attacker Value
Unknown

CVE-2011-3190

Disclosure Date: August 31, 2011 (last updated October 04, 2023)
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
0
Attacker Value
Unknown

CVE-2011-2526

Disclosure Date: July 14, 2011 (last updated October 04, 2023)
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
0
Attacker Value
Unknown

CVE-2011-2204

Disclosure Date: June 29, 2011 (last updated October 04, 2023)
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
0
Attacker Value
Unknown

CVE-2011-0013

Disclosure Date: February 19, 2011 (last updated October 04, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
0
Attacker Value
Unknown

CVE-2010-3718

Disclosure Date: February 10, 2011 (last updated October 04, 2023)
Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
0
Attacker Value
Unknown

CVE-2011-0534

Disclosure Date: February 10, 2011 (last updated October 04, 2023)
Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.
0
Attacker Value
Unknown

CVE-2010-4312

Disclosure Date: November 26, 2010 (last updated October 04, 2023)
The default configuration of Apache Tomcat 6.x does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie.
0