Search for packages
| purl | pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5bej-9h7w-33c8
Aliases: CVE-2017-9798 |
When an unrecognized HTTP Method is given in an <Limit {method}> directive in an .htaccess file, and that .htaccess file is processed by the corresponding request, the global methods table is corrupted in the current worker process, resulting in erratic behaviour. This behavior may be avoided by listing all unusual HTTP Methods in a global httpd.conf RegisterHttpMethod directive in httpd release 2.4.25 and later. To permit other .htaccess directives while denying the <Limit > directive, see the AllowOverrideList directive. Source code patch (2.4) is at; CVE-2017-9798-patch-2.4.patch Source code patch (2.2) is at; CVE-2017-9798-patch-2.2.patch Note 2.2 is end-of-life, no further release with this fix is planned. Users are encouraged to migrate to 2.4.28 or later for this and other fixes. | There are no reported fixed by versions. |
|
VCID-jt89-ruvk-1kbj
Aliases: CVE-2017-9788 |
The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault. | There are no reported fixed by versions. |
|
VCID-q6hm-mmfs-zka5
Aliases: CVE-2017-12615 GHSA-pjfr-qf3p-3q25 |
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. | There are no reported fixed by versions. |
|
VCID-vdnj-sqmx-e3ep
Aliases: CVE-2017-12617 GHSA-xjgh-84hx-56c5 |
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. | There are no reported fixed by versions. |
|
VCID-x54g-mhs4-mug4
Aliases: CVE-2016-2183 |
Multiple vulnerabilities have been found in Oracle's JRE and JDK software suites, the worst of which may allow execution of arbitrary code | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:35:32.514323+00:00 | RedHat Importer | Affected by | VCID-x54g-mhs4-mug4 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json | 38.0.0 |
| 2026-04-01T14:30:00.930271+00:00 | RedHat Importer | Affected by | VCID-jt89-ruvk-1kbj | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9788.json | 38.0.0 |
| 2026-04-01T14:28:43.444831+00:00 | RedHat Importer | Affected by | VCID-5bej-9h7w-33c8 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9798.json | 38.0.0 |
| 2026-04-01T14:28:42.736256+00:00 | RedHat Importer | Affected by | VCID-q6hm-mmfs-zka5 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12615.json | 38.0.0 |
| 2026-04-01T14:28:36.876439+00:00 | RedHat Importer | Affected by | VCID-vdnj-sqmx-e3ep | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12617.json | 38.0.0 |