Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.72606
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: tomcat
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: tomcat

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-3439
Common Vulnerability Exposure (CVE) ID: CVE-2012-2733
BugTraq ID: 56402
http://www.securityfocus.com/bid/56402
HPdes Security Advisory: HPSBMU02873
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878
HPdes Security Advisory: HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
HPdes Security Advisory: HPSBUX02866
http://marc.info/?l=bugtraq&m=136612293908376&w=2
HPdes Security Advisory: SSRT101139
HPdes Security Advisory: SSRT101182
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19218
http://www.securitytracker.com/id?1027729
http://secunia.com/advisories/51371
http://secunia.com/advisories/57126
SuSE Security Announcement: openSUSE-SU-2012:1700 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html
SuSE Security Announcement: openSUSE-SU-2012:1701 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html
SuSE Security Announcement: openSUSE-SU-2013:0147 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html
http://www.ubuntu.com/usn/USN-1637-1
Common Vulnerability Exposure (CVE) ID: CVE-2012-3546
1027833
http://www.securitytracker.com/id?1027833
20121204 CVE-2012-3546 Apache Tomcat Bypass of security constraints
http://archives.neohapsis.com/archives/bugtraq/2012-12/0044.html
51984
http://secunia.com/advisories/51984
52054
http://secunia.com/advisories/52054
56812
http://www.securityfocus.com/bid/56812
57126
HPSBMU02873
HPSBST02955
HPSBUX02866
RHSA-2013:0004
http://rhn.redhat.com/errata/RHSA-2013-0004.html
RHSA-2013:0005
http://rhn.redhat.com/errata/RHSA-2013-0005.html
RHSA-2013:0146
http://rhn.redhat.com/errata/RHSA-2013-0146.html
RHSA-2013:0147
http://rhn.redhat.com/errata/RHSA-2013-0147.html
RHSA-2013:0151
http://rhn.redhat.com/errata/RHSA-2013-0151.html
RHSA-2013:0157
http://rhn.redhat.com/errata/RHSA-2013-0157.html
RHSA-2013:0158
http://rhn.redhat.com/errata/RHSA-2013-0158.html
RHSA-2013:0162
http://rhn.redhat.com/errata/RHSA-2013-0162.html
RHSA-2013:0163
http://rhn.redhat.com/errata/RHSA-2013-0163.html
RHSA-2013:0164
http://rhn.redhat.com/errata/RHSA-2013-0164.html
RHSA-2013:0191
http://rhn.redhat.com/errata/RHSA-2013-0191.html
RHSA-2013:0192
http://rhn.redhat.com/errata/RHSA-2013-0192.html
RHSA-2013:0193
http://rhn.redhat.com/errata/RHSA-2013-0193.html
RHSA-2013:0194
http://rhn.redhat.com/errata/RHSA-2013-0194.html
RHSA-2013:0195
http://rhn.redhat.com/errata/RHSA-2013-0195.html
RHSA-2013:0196
http://rhn.redhat.com/errata/RHSA-2013-0196.html
RHSA-2013:0197
http://rhn.redhat.com/errata/RHSA-2013-0197.html
RHSA-2013:0198
http://rhn.redhat.com/errata/RHSA-2013-0198.html
RHSA-2013:0221
http://rhn.redhat.com/errata/RHSA-2013-0221.html
RHSA-2013:0235
http://rhn.redhat.com/errata/RHSA-2013-0235.html
RHSA-2013:0623
http://rhn.redhat.com/errata/RHSA-2013-0623.html
RHSA-2013:0640
http://rhn.redhat.com/errata/RHSA-2013-0640.html
RHSA-2013:0641
http://rhn.redhat.com/errata/RHSA-2013-0641.html
RHSA-2013:0642
http://rhn.redhat.com/errata/RHSA-2013-0642.html
SSRT101139
SSRT101182
USN-1685-1
http://www.ubuntu.com/usn/USN-1685-1
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/realm/RealmBase.java?r1=1377892&r2=1377891&pathrev=1377892
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1377892&r2=1377891&pathrev=1377892
http://svn.apache.org/viewvc?view=revision&revision=1377892
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
openSUSE-SU-2012:1700
openSUSE-SU-2012:1701
openSUSE-SU-2013:0147
oval:org.mitre.oval:def:19305
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19305
Common Vulnerability Exposure (CVE) ID: CVE-2012-4431
BugTraq ID: 56814
http://www.securityfocus.com/bid/56814
Bugtraq: 20121204 CVE-2012-4431 Apache Tomcat Bypass of CSRF prevention filter (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2012-12/0045.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18541
RedHat Security Advisories: RHSA-2013:0267
http://rhn.redhat.com/errata/RHSA-2013-0267.html
RedHat Security Advisories: RHSA-2013:0268
http://rhn.redhat.com/errata/RHSA-2013-0268.html
RedHat Security Advisories: RHSA-2013:0647
http://rhn.redhat.com/errata/RHSA-2013-0647.html
RedHat Security Advisories: RHSA-2013:0648
http://rhn.redhat.com/errata/RHSA-2013-0648.html
RedHat Security Advisories: RHSA-2013:1437
http://rhn.redhat.com/errata/RHSA-2013-1437.html
RedHat Security Advisories: RHSA-2013:1853
http://rhn.redhat.com/errata/RHSA-2013-1853.html
http://www.securitytracker.com/id?1027834
SuSE Security Announcement: openSUSE-SU-2013:0161 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html
SuSE Security Announcement: openSUSE-SU-2013:0192 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-4534
1027836
http://www.securitytracker.com/id?1027836
20121204 CVE-2012-4534 Apache Tomcat denial of service
http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html
56813
http://www.securityfocus.com/bid/56813
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218
http://svn.apache.org/viewvc?view=revision&revision=1340218
https://issues.apache.org/bugzilla/show_bug.cgi?id=52858
openSUSE-SU-2013:0161
openSUSE-SU-2013:0170
http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html
openSUSE-SU-2013:0192
oval:org.mitre.oval:def:19398
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398
Common Vulnerability Exposure (CVE) ID: CVE-2012-3544
BugTraq ID: 59797
http://www.securityfocus.com/bid/59797
BugTraq ID: 64758
http://www.securityfocus.com/bid/64758
Bugtraq: 20130510 [SECURITY] CVE-2012-3544 Chunked transfer encoding extension size is not limited (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html
Bugtraq: 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://seclists.org/fulldisclosure/2014/Dec/23
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
http://www.ubuntu.com/usn/USN-1841-1
CopyrightCopyright (C) 2012 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.