Search CVE reports
41 – 50 of 106 results
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such...
3 affected packages
tomcat7, tomcat8, tomcat9
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat7 | Not in release | Not in release | Not in release | Ignored |
tomcat8 | Not in release | Not in release | Not in release | Ignored |
tomcat9 | Not affected | Not affected | Not affected | Ignored |
Some fixes available 1 of 7
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility...
3 affected packages
tomcat8, tomcat9, tomcat7
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat8 | Not in release | Not in release | Not in release | Needs evaluation |
tomcat9 | Not affected | Not affected | Not affected | Needs evaluation |
tomcat7 | Not in release | Not in release | Not in release | Needs evaluation |
Some fixes available 2 of 4
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection...
2 affected packages
tomcat8, tomcat9
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat8 | Not in release | Not in release | Not in release | Vulnerable |
tomcat9 | Not affected | Not affected | Fixed | Fixed |
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was...
2 affected packages
tomcat8, tomcat9
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat8 | — | — | Not in release | Not affected |
tomcat9 | — | — | Not affected | Not affected |
Some fixes available 2 of 10
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop....
4 affected packages
tomcat9, tomcat6, tomcat7, tomcat8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat9 | Not affected | Not affected | Fixed | Needs evaluation |
tomcat6 | Not in release | Not in release | Not in release | Not in release |
tomcat7 | Not in release | Not in release | Not in release | Needs evaluation |
tomcat8 | Not in release | Not in release | Not in release | Needs evaluation |
Some fixes available 1 of 8
An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an...
4 affected packages
tomcat8, tomcat9, tomcat6, tomcat7
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat8 | Not in release | Not in release | Not in release | Needs evaluation |
tomcat9 | Not affected | Not affected | Fixed | Needs evaluation |
tomcat6 | Not in release | Not in release | Not in release | Not in release |
tomcat7 | Not in release | Not in release | Not in release | Needs evaluation |
Some fixes available 1 of 4
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were...
2 affected packages
tomcat9, tomcat8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat9 | Not affected | Not affected | Fixed | Needs evaluation |
tomcat8 | Not in release | Not in release | Not in release | Needs evaluation |
The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading...
3 affected packages
tomcat7, tomcat8, tomcat9
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat7 | — | — | — | Not affected |
tomcat8 | — | — | — | Not affected |
tomcat9 | — | — | — | Not affected |
Some fixes available 1 of 8
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow...
3 affected packages
tomcat7, tomcat8, tomcat9
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat7 | Not in release | Not in release | Not in release | Needs evaluation |
tomcat8 | Not in release | Not in release | Not in release | Needs evaluation |
tomcat9 | Not affected | Not affected | Not affected | Needs evaluation |
Some fixes available 1 of 8
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the...
3 affected packages
tomcat8, tomcat9, tomcat7
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
tomcat8 | Not in release | Not in release | Not in release | Needs evaluation |
tomcat9 | Not affected | Not affected | Not affected | Needs evaluation |
tomcat7 | Not in release | Not in release | Not in release | Needs evaluation |