Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1:1.0.15-17.redhat_2.jbcs?arch=el6
purl pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1:1.0.15-17.redhat_2.jbcs?arch=el6
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (11)
Vulnerability Summary Fixed by
VCID-18q4-zark-s7a7
Aliases:
CVE-2016-6794
GHSA-2rvf-329f-p99g
When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. There are no reported fixed by versions.
VCID-3cr9-g81m-4ugy
Aliases:
CVE-2016-5018
GHSA-4v3g-g84w-hv7r
In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. There are no reported fixed by versions.
VCID-3n4t-bvb1-5qer
Aliases:
CVE-2016-6796
GHSA-3mjp-p938-4329
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. There are no reported fixed by versions.
VCID-3r3s-q21j-c3au
Aliases:
CVE-2016-6816
GHSA-jc7p-5r39-9477
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. There are no reported fixed by versions.
VCID-95d1-arxd-hkd1
Aliases:
CVE-2016-8735
GHSA-cw54-59pw-4g8c
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types. There are no reported fixed by versions.
VCID-bk88-51w4-mfcn
Aliases:
CVE-2016-1240
Multiple vulnerabilities have been found in Apache Tomcat, the worst of which could lead to privilege escalation. There are no reported fixed by versions.
VCID-hves-r5bg-yfes
Aliases:
CVE-2016-8745
GHSA-w3j5-q8f2-3cqq
A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions. There are no reported fixed by versions.
VCID-kagr-74d9-kyhx
Aliases:
CVE-2016-0762
GHSA-wxcp-f2c8-x6xv
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. There are no reported fixed by versions.
VCID-msy8-g5w8-afbd
Aliases:
CVE-2016-6325
tomcat: tomcat writable config files allow privilege escalation There are no reported fixed by versions.
VCID-pqxe-tfhk-47b7
Aliases:
CVE-2016-3092
GHSA-fvm3-cfvj-gxqq
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. There are no reported fixed by versions.
VCID-xf8r-kqxb-7qdy
Aliases:
CVE-2016-6797
GHSA-q6x7-f33r-3wxx
The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:36:17.260704+00:00 RedHat Importer Affected by VCID-pqxe-tfhk-47b7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3092.json 38.0.0
2026-04-01T14:34:49.074761+00:00 RedHat Importer Affected by VCID-bk88-51w4-mfcn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1240.json 38.0.0
2026-04-01T14:34:16.627785+00:00 RedHat Importer Affected by VCID-msy8-g5w8-afbd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6325.json 38.0.0
2026-04-01T14:33:57.146140+00:00 RedHat Importer Affected by VCID-kagr-74d9-kyhx https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0762.json 38.0.0
2026-04-01T14:33:53.343198+00:00 RedHat Importer Affected by VCID-3cr9-g81m-4ugy https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5018.json 38.0.0
2026-04-01T14:33:51.285896+00:00 RedHat Importer Affected by VCID-18q4-zark-s7a7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6794.json 38.0.0
2026-04-01T14:33:47.443201+00:00 RedHat Importer Affected by VCID-3n4t-bvb1-5qer https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6796.json 38.0.0
2026-04-01T14:33:45.423043+00:00 RedHat Importer Affected by VCID-xf8r-kqxb-7qdy https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6797.json 38.0.0
2026-04-01T14:33:15.927250+00:00 RedHat Importer Affected by VCID-95d1-arxd-hkd1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8735.json 38.0.0
2026-04-01T14:33:11.236459+00:00 RedHat Importer Affected by VCID-3r3s-q21j-c3au https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6816.json 38.0.0
2026-04-01T14:33:04.388772+00:00 RedHat Importer Affected by VCID-hves-r5bg-yfes https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8745.json 38.0.0