Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.72606
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: tomcat
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: tomcat

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2012-3439
Common Vulnerability Exposure (CVE) ID: CVE-2012-2733
BugTraq ID: 56402
http://www.securityfocus.com/bid/56402
HPdes Security Advisory: HPSBMU02873
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878
HPdes Security Advisory: HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
HPdes Security Advisory: HPSBUX02866
http://marc.info/?l=bugtraq&m=136612293908376&w=2
HPdes Security Advisory: SSRT101139
HPdes Security Advisory: SSRT101182
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19218
http://www.securitytracker.com/id?1027729
http://secunia.com/advisories/51371
http://secunia.com/advisories/57126
SuSE Security Announcement: openSUSE-SU-2012:1700 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html
SuSE Security Announcement: openSUSE-SU-2012:1701 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html
SuSE Security Announcement: openSUSE-SU-2013:0147 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html
http://www.ubuntu.com/usn/USN-1637-1
Common Vulnerability Exposure (CVE) ID: CVE-2012-3546
1027833
http://www.securitytracker.com/id?1027833
20121204 CVE-2012-3546 Apache Tomcat Bypass of security constraints
http://archives.neohapsis.com/archives/bugtraq/2012-12/0044.html
51984
http://secunia.com/advisories/51984
52054
http://secunia.com/advisories/52054
56812
http://www.securityfocus.com/bid/56812
57126
HPSBMU02873
HPSBST02955
HPSBUX02866
RHSA-2013:0004
http://rhn.redhat.com/errata/RHSA-2013-0004.html
RHSA-2013:0005
http://rhn.redhat.com/errata/RHSA-2013-0005.html
RHSA-2013:0146
http://rhn.redhat.com/errata/RHSA-2013-0146.html
RHSA-2013:0147
http://rhn.redhat.com/errata/RHSA-2013-0147.html
RHSA-2013:0151
http://rhn.redhat.com/errata/RHSA-2013-0151.html
RHSA-2013:0157
http://rhn.redhat.com/errata/RHSA-2013-0157.html
RHSA-2013:0158
http://rhn.redhat.com/errata/RHSA-2013-0158.html
RHSA-2013:0162
http://rhn.redhat.com/errata/RHSA-2013-0162.html
RHSA-2013:0163
http://rhn.redhat.com/errata/RHSA-2013-0163.html
RHSA-2013:0164
http://rhn.redhat.com/errata/RHSA-2013-0164.html
RHSA-2013:0191
http://rhn.redhat.com/errata/RHSA-2013-0191.html
RHSA-2013:0192
http://rhn.redhat.com/errata/RHSA-2013-0192.html
RHSA-2013:0193
http://rhn.redhat.com/errata/RHSA-2013-0193.html
RHSA-2013:0194
http://rhn.redhat.com/errata/RHSA-2013-0194.html
RHSA-2013:0195
http://rhn.redhat.com/errata/RHSA-2013-0195.html
RHSA-2013:0196
http://rhn.redhat.com/errata/RHSA-2013-0196.html
RHSA-2013:0197
http://rhn.redhat.com/errata/RHSA-2013-0197.html
RHSA-2013:0198
http://rhn.redhat.com/errata/RHSA-2013-0198.html
RHSA-2013:0221
http://rhn.redhat.com/errata/RHSA-2013-0221.html
RHSA-2013:0235
http://rhn.redhat.com/errata/RHSA-2013-0235.html
RHSA-2013:0623
http://rhn.redhat.com/errata/RHSA-2013-0623.html
RHSA-2013:0640
http://rhn.redhat.com/errata/RHSA-2013-0640.html
RHSA-2013:0641
http://rhn.redhat.com/errata/RHSA-2013-0641.html
RHSA-2013:0642
http://rhn.redhat.com/errata/RHSA-2013-0642.html
SSRT101139
SSRT101182
USN-1685-1
http://www.ubuntu.com/usn/USN-1685-1
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/realm/RealmBase.java?r1=1377892&r2=1377891&pathrev=1377892
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1377892&r2=1377891&pathrev=1377892
http://svn.apache.org/viewvc?view=revision&revision=1377892
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
openSUSE-SU-2012:1700
openSUSE-SU-2012:1701
openSUSE-SU-2013:0147
oval:org.mitre.oval:def:19305
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19305
Common Vulnerability Exposure (CVE) ID: CVE-2012-4431
BugTraq ID: 56814
http://www.securityfocus.com/bid/56814
Bugtraq: 20121204 CVE-2012-4431 Apache Tomcat Bypass of CSRF prevention filter (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2012-12/0045.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18541
RedHat Security Advisories: RHSA-2013:0267
http://rhn.redhat.com/errata/RHSA-2013-0267.html
RedHat Security Advisories: RHSA-2013:0268
http://rhn.redhat.com/errata/RHSA-2013-0268.html
RedHat Security Advisories: RHSA-2013:0647
http://rhn.redhat.com/errata/RHSA-2013-0647.html
RedHat Security Advisories: RHSA-2013:0648
http://rhn.redhat.com/errata/RHSA-2013-0648.html
RedHat Security Advisories: RHSA-2013:1437
http://rhn.redhat.com/errata/RHSA-2013-1437.html
RedHat Security Advisories: RHSA-2013:1853
http://rhn.redhat.com/errata/RHSA-2013-1853.html
http://www.securitytracker.com/id?1027834
SuSE Security Announcement: openSUSE-SU-2013:0161 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html
SuSE Security Announcement: openSUSE-SU-2013:0192 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-4534
1027836
http://www.securitytracker.com/id?1027836
20121204 CVE-2012-4534 Apache Tomcat denial of service
http://archives.neohapsis.com/archives/bugtraq/2012-12/0043.html
56813
http://www.securityfocus.com/bid/56813
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/tomcat/util/net/NioEndpoint.java?r1=1340218&r2=1340217&pathrev=1340218
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1340218&r2=1340217&pathrev=1340218
http://svn.apache.org/viewvc?view=revision&revision=1340218
https://issues.apache.org/bugzilla/show_bug.cgi?id=52858
openSUSE-SU-2013:0161
openSUSE-SU-2013:0170
http://lists.opensuse.org/opensuse-updates/2013-01/msg00061.html
openSUSE-SU-2013:0192
oval:org.mitre.oval:def:19398
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19398
Common Vulnerability Exposure (CVE) ID: CVE-2012-3544
BugTraq ID: 59797
http://www.securityfocus.com/bid/59797
BugTraq ID: 64758
http://www.securityfocus.com/bid/64758
Bugtraq: 20130510 [SECURITY] CVE-2012-3544 Chunked transfer encoding extension size is not limited (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2013-05/0042.html
Bugtraq: 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://seclists.org/fulldisclosure/2014/Dec/23
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
http://www.ubuntu.com/usn/USN-1841-1
CopyrightCopyright (C) 2012 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.