![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2185 – Tomcat/JBossWeb: Arbitrary file upload via deserialization
https://notcve.org/view.php?id=CVE-2013-2185
04 Sep 2013 — The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications t... • http://openwall.com/lists/oss-security/2014/10/24/12 • CWE-20: Improper Input Validation CWE-626: Null Byte Interaction Error (Poison Null Byte) •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-5885 – tomcat: three DIGEST authentication implementation issues
https://notcve.org/view.php?id=CVE-2012-5885
17 Nov 2012 — The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184. La funcionalidad replay-countermeasure en Apache Tomcat ... • http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-5886 – tomcat: three DIGEST authentication implementation issues
https://notcve.org/view.php?id=CVE-2012-5886
17 Nov 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID. La implementación de HTTP Digest Access Authentication en Apache Tomcat v5.5.x antes de v5.5.36, 6.x antes 6.0.36, v7.x antes de v7.0.30 cachés información sobre el usuario autenticado en el estado d... • http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html • CWE-287: Improper Authentication •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-5887 – tomcat: three DIGEST authentication implementation issues
https://notcve.org/view.php?id=CVE-2012-5887
17 Nov 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests. La implementación de HTTP Digest Access Authentication en Apache Tomcat v5.5.x antes de v5.5.36, v6.x antes de v6.0.36, v7.x antes de v7.0.30 no comprue... • http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html • CWE-287: Improper Authentication •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-0022 – tomcat: large number of parameters DoS
https://notcve.org/view.php?id=CVE-2012-0022
19 Jan 2012 — Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. Apache Tomcat v5.5.x antes de v5.5.35, v6.x antes de v6.0.34, v7.x antes de v7.0.23 utiliza un método ineficiente para el manejo de parámetros, lo que permite provocar una denegación de servici... • http://archives.neohapsis.com/archives/bugtraq/2012-01/0112.html • CWE-189: Numeric Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-5062 – tomcat: Multiple weaknesses in HTTP DIGEST authentication
https://notcve.org/view.php?id=CVE-2011-5062
14 Jan 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184. La implementación HTTP Digest Access Authentication en Apache Tomcat v5.5.x anterior a v5.5.34, v6.x anterior a v6.0.33, y v7.x anterior a v7.0.12 no comprueba valores qop, lo que puede permitir a ... • http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-1184 – tomcat: Multiple weaknesses in HTTP DIGEST authentication
https://notcve.org/view.php?id=CVE-2011-1184
14 Jan 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values. La implementación HTTP Digest Access Authentication en Apache Tomcat v5.5.x ... • http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-5063 – tomcat: Multiple weaknesses in HTTP DIGEST authentication
https://notcve.org/view.php?id=CVE-2011-5063
14 Jan 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or authorization requirements, a different vulnerability than CVE-2011-1184. La implementación HTTP Digest Access Authentication en Apache Tomcat v5.5.x anterior a v5.5.34, v6.x anterior a v6.0.33,... • http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html • CWE-287: Improper Authentication •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-5064 – tomcat: Multiple weaknesses in HTTP DIGEST authentication
https://notcve.org/view.php?id=CVE-2011-5064
14 Jan 2012 — DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging knowledge of this string, a different vulnerability than CVE-2011-1184. DigestAuthenticator.java en la implementación HTTP Digest Access Authentication en Apache Tomcat v5.5.x anterior... • http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html • CWE-310: Cryptographic Issues •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-3190 – tomcat: authentication bypass and information disclosure
https://notcve.org/view.php?id=CVE-2011-3190
31 Aug 2011 — Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request. Algunas implementaciones del conector del protocolo AJP en Apache Tomcat v7.0.0 a v7.0.20, v6.0.0 a v6.0.33, v5.5.0 a v5.5.33, y posiblemente con otras versiones, permiten a atacant... • http://marc.info/?l=bugtraq&m=132215163318824&w=2 • CWE-264: Permissions, Privileges, and Access Controls •