VYPR

Maven package

org.apache.tomcat/tomcat-catalina

pkg:maven/org.apache.tomcat/tomcat-catalina

Vulnerabilities (30)

  • CVE-2023-28708Mar 22, 2023
    affected >= 11.0.0-M1, < 11.0.0-M3fixed 11.0.0-M3

    When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not i

  • CVE-2022-45143Jan 3, 2023
    affected >= 10.1.0, < 10.1.2fixed 10.1.2

    The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that inv

  • CVE-2017-12617HigKEVOct 4, 2017
    affected >= 9.0.0.M1, < 9.0.1fixed 9.0.1

    When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a

  • CVE-2017-12616HigSep 19, 2017
    affected >= 7.0.0, < 7.0.81fixed 7.0.81

    When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.

  • CVE-2017-5648CriApr 17, 2017
    affected >= 9.0.0.M1, < 9.0.0.M18fixed 9.0.0.M18

    While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a Securi

  • CVE-2016-8735CriKEVApr 6, 2017
    affected < 6.0.48fixed 6.0.48

    Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated

  • CVE-2016-5388HigJul 19, 2016
    affected >= 7.0.0, < 7.0.72fixed 7.0.72

    Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attacke

  • CVE-2014-0119May 31, 2014
    affected < 6.0.40fixed 6.0.40

    Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XM

  • CVE-2014-0096May 31, 2014
    affected < 6.0.40fixed 6.0.40

    java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitra

  • CVE-2012-5886Nov 17, 2012
    affected >= 5.5.0, < 5.5.36fixed 5.5.36

    The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via ve

Page 2 of 2