Page 5 of 54 results (0.015 seconds)

CVSS: 5.3EPSS: 0%CPEs: 77EXPL: 0

14 Jan 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184. La implementación HTTP Digest Access Authentication en Apache Tomcat v5.5.x anterior a v5.5.34, v6.x anterior a v6.0.33, y v7.x anterior a v7.0.12 no comprueba valores qop, lo que puede permitir a ... • http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.3EPSS: 0%CPEs: 77EXPL: 0

14 Jan 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values. La implementación HTTP Digest Access Authentication en Apache Tomcat v5.5.x ... • http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 77EXPL: 0

14 Jan 2012 — The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or authorization requirements, a different vulnerability than CVE-2011-1184. La implementación HTTP Digest Access Authentication en Apache Tomcat v5.5.x anterior a v5.5.34, v6.x anterior a v6.0.33,... • http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 77EXPL: 0

14 Jan 2012 — DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging knowledge of this string, a different vulnerability than CVE-2011-1184. DigestAuthenticator.java en la implementación HTTP Digest Access Authentication en Apache Tomcat v5.5.x anterior... • http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html • CWE-310: Cryptographic Issues •

CVSS: 5.3EPSS: 80%CPEs: 59EXPL: 2

05 Jan 2012 — Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. Apache Tomcat antes de v5.5.35, v6.x antes de v6.0.35 y v7.x antes de v7.0.23 calcula los valores hash de los parámetros de los formularios, sin restringir la capacidad de desencadenar colisiones de hash de forma pre... • https://packetstorm.news/files/id/180523 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 1%CPEs: 85EXPL: 1

31 Aug 2011 — Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request. Algunas implementaciones del conector del protocolo AJP en Apache Tomcat v7.0.0 a v7.0.20, v6.0.0 a v6.0.33, v5.5.0 a v5.5.33, y posiblemente con otras versiones, permiten a atacant... • http://marc.info/?l=bugtraq&m=132215163318824&w=2 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.1EPSS: 0%CPEs: 39EXPL: 0

15 Aug 2011 — native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application. native/unix/native/jsvc-unix.c en jsvc en el componente Daemon v1.0.3 hasta v1.0.6 en Apache Commons, usado en Apache Tomcat v5.5.32 hasta v5.5.33, v6.0.30 hasta v6.0.32, y v7.0... • http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00024.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.3EPSS: 0%CPEs: 80EXPL: 0

14 Jul 2011 — Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application. Apache Tomcat v5.5.x anterior a v5.5.34, v6.x anterior a v6.0.33, y v7.x anterior a v7.0.19, cuando sendfile está habilitado para el conector HTTP APR o ... • http://marc.info/?l=bugtraq&m=132215163318824&w=2 • CWE-20: Improper Input Validation •

CVSS: 3.3EPSS: 0%CPEs: 79EXPL: 0

29 Jun 2011 — Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file. Apache Tomcat v5.5.x antes de v5.5.34, v6.0.33 antes de v6.x, v7.x antes de v7.0.17, cuando el MemoryUserDatabase se utiliza, crea entradas del registro que contienen las contraseñas al encontrar errores en la creación de usuarios... • http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 1%CPEs: 65EXPL: 1

18 Feb 2011 — Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en la interfaz de HTML Manager en Apache Software Foundation Tomcat v7.0 antes de v7.0.6, v5.5 antes de v5.5.32 y v6.0 antes de v6.0.30 permiten a atacantes remotos inyecta... • http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •