English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 72151 CVE Beschreibungen
und 38907 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.835223
Kategorie:HP-UX Local Security Checks
Titel:HP-UX Update for Tomcat Servlet Engine HPSBUX02466
Zusammenfassung:Check for the Version of Tomcat Servlet Engine
Beschreibung:

Vulnerability Insight:
Potential security vulnerabilities have been identified with HP-UX running
Tomcat-based Servlet Engine. The vulnerabilities could be exploited remotely
to cause a Denial of Service (DoS) or unauthorized access. Tomcat-based
Servlet Engine is contained in the Apache Web Server Suite.

Impact:
Remote Denial of Service (DoS)
unauthorized access

Affected Software/OS:
Tomcat Servlet Engine on
HP-UX B.11.11, B.11.23 and B.11.31 running Tomcat-based Servlet Engine
v5.5.27.02 or earlier

Fix: Please Install the Updated Packages.

References:
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01908935-1
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-5515
Bugtraq: 20090608 [SECURITY] CVE-2008-5515 RequestDispatcher directory traversal vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504170/100/0/threaded
Bugtraq: 20090610 [SECURITY] UPDATED CVE-2008-5515 RequestDispatcher directory traversal vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504202/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Debian Security Information: DSA-2207 (Google Search)
http://www.debian.org/security/2011/dsa-2207
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html
HPdes Security Advisory: HPSBUX02579
http://marc.info/?l=bugtraq&m=129070310906557&w=2
HPdes Security Advisory: SSRT100203
HPdes Security Advisory: HPSBUX02860
http://marc.info/?l=bugtraq&m=136485229118404&w=2
HPdes Security Advisory: SSRT101146
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
http://www.mandriva.com/security/advisories?name=MDVSA-2009:138
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1
SuSE Security Announcement: SUSE-SR:2009:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
SuSE Security Announcement: SUSE-SR:2010:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
http://jvn.jp/en/jp/JVN63832775/index.html
BugTraq ID: 35263
http://www.securityfocus.com/bid/35263
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10422
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6445
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19452
http://secunia.com/advisories/35393
http://secunia.com/advisories/35685
http://secunia.com/advisories/35788
http://secunia.com/advisories/37460
http://secunia.com/advisories/39317
http://secunia.com/advisories/42368
http://secunia.com/advisories/44183
http://www.vupen.com/english/advisories/2009/1520
http://www.vupen.com/english/advisories/2009/1535
http://www.vupen.com/english/advisories/2009/1856
http://www.vupen.com/english/advisories/2009/3316
http://www.vupen.com/english/advisories/2010/3056
Common Vulnerability Exposure (CVE) ID: CVE-2009-0033
Bugtraq: 20090603 [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504044/100/0/threaded
http://jvn.jp/en/jp/JVN87272440/index.html
BugTraq ID: 35193
http://www.securityfocus.com/bid/35193
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10231
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5739
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19110
http://securitytracker.com/id?1022331
http://secunia.com/advisories/35326
http://secunia.com/advisories/35344
http://www.vupen.com/english/advisories/2009/1496
XForce ISS Database: tomcat-ajp-dos(50928)
http://xforce.iss.net/xforce/xfdb/50928
Common Vulnerability Exposure (CVE) ID: CVE-2009-0580
Bugtraq: 20090603 [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504045/100/0/threaded
Bugtraq: 20090604 Re: [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504108/100/0/threaded
Bugtraq: 20090605 [SECURITY] CVE-2009-0580 UPDATED Apache Tomcat User enumeration vulnerability with FORM authentication (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504125/100/0/threaded
BugTraq ID: 35196
http://www.securityfocus.com/bid/35196
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6628
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9101
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:18915
http://securitytracker.com/id?1022332
XForce ISS Database: tomcat-jsecuritycheck-info-disclosure(50930)
http://xforce.iss.net/xforce/xfdb/50930
Common Vulnerability Exposure (CVE) ID: CVE-2009-0781
Bugtraq: 20090306 [SECURITY] CVE-2009-0781 XSS in Apache Tomcat examples web application (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501538/100/0/threaded
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11041
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6564
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19345
XForce ISS Database: tomcat-cal2-xss(49213)
http://xforce.iss.net/xforce/xfdb/49213
Common Vulnerability Exposure (CVE) ID: CVE-2009-0783
Bugtraq: 20090604 [SECURITY] CVE-2009-0783 Apache Tomcat Information disclosure (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504090/100/0/threaded
BugTraq ID: 35416
http://www.securityfocus.com/bid/35416
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10716
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6450
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:18913
http://www.securitytracker.com/id?1022336
XForce ISS Database: tomcat-xml-information-disclosure(51195)
http://xforce.iss.net/xforce/xfdb/51195
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 38907 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.