Lucene search

K
ApacheTomcat6.0.6

6 matches found

CVE
CVE
added 2010/04/23 2:30 p.m.118 views

CVE-2010-1157

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the r...

2.6CVSS4.4AI score0.13817EPSS
CVE
CVE
added 2010/07/13 5:30 p.m.96 views

CVE-2010-2227

Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling...

6.4CVSS4.4AI score0.64738EPSS
CVE
CVE
added 2010/01/28 8:30 p.m.93 views

CVE-2009-2902

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

4.3CVSS5AI score0.1008EPSS
CVE
CVE
added 2010/01/28 8:30 p.m.85 views

CVE-2009-2693

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.

5.8CVSS5.1AI score0.15322EPSS
CVE
CVE
added 2010/01/28 8:30 p.m.85 views

CVE-2009-2901

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.

4.3CVSS5.7AI score0.06552EPSS
CVE
CVE
added 2010/11/26 8:0 p.m.58 views

CVE-2010-4312

The default configuration of Apache Tomcat 6.x does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie.

6.4CVSS4.4AI score0.01735EPSS