Search for packages
purl | pkg:deb/debian/tomcat8@8.5.54-0%2Bdeb9u1 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-259r-tjud-aaad | Potential HTTP request smuggling in Apache Tomcat |
CVE-2020-1935
GHSA-qxf4-chvg-4r8r |
VCID-2nrx-8urf-aaaf | Cross-site scripting in Apache Tomcat |
CVE-2019-0221
GHSA-jjpq-gp5q-8q6w |
VCID-2xpy-bz6f-aaak | Improper Privilege Management in Tomcat |
CVE-2020-1938
GHSA-c9hw-wf7x-jp9j |
VCID-7c2n-n9ga-aaar | The host name verification missing in Apache Tomcat |
CVE-2018-8034
GHSA-46j3-r4pj-4835 |
VCID-7qs4-bekd-aaab | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core |
CVE-2018-11784
GHSA-5q99-f34m-67gc |
VCID-8qf1-1syh-aaap | Insufficiently Protected Credentials in Apache Tomcat |
CVE-2019-12418
GHSA-hh3j-x4mc-g48r |
VCID-9pu2-we8w-aaar | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core |
CVE-2018-1305
GHSA-jx6h-3fjx-cgv5 |
VCID-9qvr-8e2y-aaah | Potential HTTP request smuggling in Apache Tomcat |
CVE-2019-17569
GHSA-767j-jfh2-jvrc |
VCID-b2z1-15m4-aaac | In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder |
CVE-2018-1336
GHSA-m59c-jpc8-m2x4 |
VCID-cp4z-y57s-aaah | The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins |
CVE-2018-8014
GHSA-r4x2-3cq5-hqvp |
VCID-d82s-fpes-aaar | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core |
CVE-2018-1304
GHSA-6rxj-58jh-436r |
VCID-h3d2-7evg-aaac | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core |
CVE-2018-8037
GHSA-6v52-mj5r-7j2m |
VCID-jqdk-mw8x-aaae | In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack |
CVE-2019-17563
GHSA-9xcj-c8cr-8c3c |
VCID-jtsq-4sgf-aaag | Insufficient Verification of Data Authenticity The CORS Filter in Apache Tomcat does not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances. |
CVE-2017-7674
GHSA-73rx-3f9r-x949 |
VCID-yv8m-r56n-aaan | Improper Handling of Exceptional Conditions The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. The Default Servlet in Apache Tomcat does not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method. |
CVE-2017-5664
GHSA-jmvv-524f-hj5j |
VCID-zxmb-hhr6-aaap | Denial of Service in Tomcat |
CVE-2019-0199
GHSA-qcxh-w3j9-58qr |