Search for packages
| purl | pkg:maven/org.apache.tomcat/tomcat@6.0.33 |
| Tags | Ghost |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-a9bd-d31y-k7g6
Aliases: CVE-2014-0033 GHSA-6gjj-c5mj-4cvp |
org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL. |
Affected by 0 other vulnerabilities. Affected by 4 other vulnerabilities. |
|
VCID-hhk9-cr54-8fgc
Aliases: CVE-2012-0022 GHSA-8h2q-qm9x-55jc |
Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. |
Affected by 0 other vulnerabilities. Affected by 5 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-hxj6-mupf-abbc
Aliases: CVE-2011-3375 GHSA-rp8h-vr48-4j8p |
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data. |
Affected by 5 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-quwu-ep21-cyew
Aliases: CVE-2011-3190 GHSA-c38m-v4m2-524v |
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request. |
Affected by 0 other vulnerabilities. Affected by 5 other vulnerabilities. Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||