Search for packages
| purl | pkg:apache/tomcat@7.0.81 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-vdnj-sqmx-e3ep
Aliases: CVE-2017-12617 GHSA-xjgh-84hx-56c5 |
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-c4jv-ws83-x7g2 | When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request. |
CVE-2017-12616
GHSA-8qq4-8jvq-mfw4 |
| VCID-q6hm-mmfs-zka5 | When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. |
CVE-2017-12615
GHSA-pjfr-qf3p-3q25 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:38:14.072848+00:00 | Apache Tomcat Importer | Fixing | VCID-q6hm-mmfs-zka5 | https://tomcat.apache.org/security-7.html | 38.0.0 |
| 2026-04-01T12:38:14.043997+00:00 | Apache Tomcat Importer | Fixing | VCID-c4jv-ws83-x7g2 | https://tomcat.apache.org/security-7.html | 38.0.0 |
| 2026-04-01T12:38:14.006615+00:00 | Apache Tomcat Importer | Affected by | VCID-vdnj-sqmx-e3ep | https://tomcat.apache.org/security-7.html | 38.0.0 |