Search for packages
purl | pkg:maven/org.apache.tomcat/tomcat@6.0.30 |
Tags | Ghost |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-21dz-gxvm-aaam
Aliases: CVE-2011-3375 GHSA-rp8h-vr48-4j8p |
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data. |
Affected by 5 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-7r1z-a7qf-aaas
Aliases: CVE-2011-0534 GHSA-43v2-6grp-9pp9 |
CVE-2011-0534 tomcat: remote DoS via NIO connector |
Affected by 4 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ntxm-uwj5-aaae
Aliases: CVE-2012-4431 GHSA-76vr-72mv-mf3q |
org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier. |
Affected by 2 other vulnerabilities. Affected by 1 other vulnerability. |
VCID-uuww-g5z6-aaad
Aliases: CVE-2011-2729 |
native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application. |
Affected by 4 other vulnerabilities. Affected by 1 other vulnerability. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |