Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request
Reporter | Title | Published | Views | Family All 90 |
---|---|---|---|---|
![]() | openSUSE Security Update : tomcat6 (openSUSE-SU-2011:1134-1) | 13 Jun 201400:00 | – | nessus |
![]() | openSUSE Security Update : tomcat6 (openSUSE-SU-2011:1134-1) | 13 Jun 201400:00 | – | nessus |
![]() | SuSE 10 Security Update : tomcat5 (ZYPP Patch Number 7755) | 24 Oct 201100:00 | – | nessus |
![]() | Apache Tomcat 7.0.0 < 7.0.21 | 2 Sep 201100:00 | – | nessus |
![]() | SuSE 10 Security Update : tomcat5 (ZYPP Patch Number 7756) | 13 Dec 201100:00 | – | nessus |
![]() | Fedora 16 : tomcat6-6.0.32-17.fc16 (2011-13426) | 19 Oct 201100:00 | – | nessus |
![]() | Fedora 15 : tomcat6-6.0.32-8.fc15 (2011-13456) | 21 Oct 201100:00 | – | nessus |
![]() | Amazon Linux AMI : tomcat6 (ALAS-2011-25) | 4 Sep 201300:00 | – | nessus |
![]() | VMware vCenter Server Multiple Vulnerabilities (VMSA-2012-0005) | 5 Jun 201300:00 | – | nessus |
![]() | Apache Tomcat 6.x < 6.0.35 Multiple Vulnerabilities | 12 Dec 201100:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo