Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.68028
Category:Mandrake Local Security Checks
Title:Mandriva Security Advisory MDVSA-2010:176 (tomcat5)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to tomcat5
announced via advisory MDVSA-2010:176.

Multiple vulnerabilities has been found and corrected in tomcat5:

Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0
through 4.1.36 does not properly handle (1) double quote () characters
or (2) \%5C (encoded backslash) sequences in a cookie value, which
might cause sensitive information such as session IDs to be leaked
to remote attackers and enable session hijacking attacks. NOTE:
this issue exists because of an incomplete fix for CVE-2007-3385
(CVE-2007-5333).

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through
6.0.18, and possibly earlier versions normalizes the target pathname
before filtering the query string when using the RequestDispatcher
method, which allows remote attackers to bypass intended access
restrictions and conduct directory traversal attacks via .. (dot dot)
sequences and the WEB-INF directory in a Request (CVE-2008-5515).

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0
through 6.0.18, when the Java AJP connector and mod_jk load balancing
are used, allows remote attackers to cause a denial of service
(application outage) via a crafted request with invalid headers,
related to temporary blocking of connectors that have encountered
errors, as demonstrated by an error involving a malformed HTTP Host
header (CVE-2009-0033).

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and
6.0.0 through 6.0.18, when FORM authentication is used, allows
remote attackers to enumerate valid usernames via requests to
/j_security_check with malformed URL encoding of passwords, related to
improper error checking in the (1) MemoryRealm, (2) DataSourceRealm,
and (3) JDBCRealm authentication realms, as demonstrated by a \%
(percent) value for the j_password parameter (CVE-2009-0580).

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0
through 6.0.18 permits web applications to replace an XML parser used
for other web applications, which allows local users to read or modify
the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web
applications via a crafted application that is loaded earlier than
the target application (CVE-2009-0783).

Directory traversal vulnerability in Apache Tomcat 5.5.0 through
5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or
overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file,
as demonstrated by a ../../bin/catalina.bat entry (CVE-2009-2693).

The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and
6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase
files that remain from a failed undeploy, which might allow remote
attackers to bypass intended authentication requirements via HTTP
requests (CVE-2009-2901).

Directory traversal vulnerability in Apache Tomcat 5.5.0 through
5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete
work-directory files via directory traversal sequences in a WAR
filename, as demonstrated by the ...war filename (CVE-2009-2902).

Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might
allow remote attackers to discover the server's hostname or IP
address by sending a request for a resource that requires (1) BASIC or
(2) DIGEST authentication, and then reading the realm field in the
WWW-Authenticate header in the reply (CVE-2010-1157).

Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0
beta does not properly handle an invalid Transfer-Encoding header,
which allows remote attackers to cause a denial of service (application
outage) or obtain sensitive information via a crafted header that
interferes with recycling of a buffer. (CVE-2010-2227)

Packages for 2008.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct these issues.

Affected: 2008.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2010:176

Risk factor : High

CVSS Score:
6.4

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-3385
AIX APAR: IZ55562
http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
BugTraq ID: 25316
http://www.securityfocus.com/bid/25316
Bugtraq: 20070814 CVE-2007-3385: Handling of \" in cookies (Google Search)
http://www.securityfocus.com/archive/1/476444/100/0/threaded
Bugtraq: 20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/500396/100/0/threaded
Bugtraq: 20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1) (Google Search)
http://www.securityfocus.com/archive/1/500412/100/0/threaded
CERT/CC vulnerability note: VU#993544
http://www.kb.cert.org/vuls/id/993544
Debian Security Information: DSA-1447 (Google Search)
http://www.debian.org/security/2008/dsa-1447
Debian Security Information: DSA-1453 (Google Search)
http://www.debian.org/security/2008/dsa-1453
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
HPdes Security Advisory: HPSBTU02276
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554
HPdes Security Advisory: HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
HPdes Security Advisory: SSRT071447
HPdes Security Advisory: SSRT071472
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9549
http://www.redhat.com/support/errata/RHSA-2007-0871.html
http://www.redhat.com/support/errata/RHSA-2007-0950.html
http://www.redhat.com/support/errata/RHSA-2008-0195.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://securitytracker.com/id?1018557
http://secunia.com/advisories/26466
http://secunia.com/advisories/26898
http://secunia.com/advisories/27037
http://secunia.com/advisories/27267
http://secunia.com/advisories/27727
http://secunia.com/advisories/28317
http://secunia.com/advisories/28361
http://secunia.com/advisories/29242
http://secunia.com/advisories/30802
http://secunia.com/advisories/33668
http://secunia.com/advisories/36486
http://secunia.com/advisories/44183
http://securityreason.com/securityalert/3011
SuSE Security Announcement: SUSE-SR:2008:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
SuSE Security Announcement: SUSE-SR:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://www.vupen.com/english/advisories/2007/2902
http://www.vupen.com/english/advisories/2007/3386
http://www.vupen.com/english/advisories/2007/3527
http://www.vupen.com/english/advisories/2008/1981/references
http://www.vupen.com/english/advisories/2009/0233
XForce ISS Database: tomcat-slashcookie-information-disclosure(35999)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35999
Common Vulnerability Exposure (CVE) ID: CVE-2007-5333
20080208 [SECURITY] CVE-2007-5333: Tomcat Cookie handling vulnerabilities
http://www.securityfocus.com/archive/1/487822/100/0/threaded
20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
http://www.securityfocus.com/archive/1/507985/100/0/threaded
27706
http://www.securityfocus.com/bid/27706
28878
http://secunia.com/advisories/28878
28884
http://secunia.com/advisories/28884
28915
http://secunia.com/advisories/28915
29711
http://secunia.com/advisories/29711
30676
http://secunia.com/advisories/30676
30802
31681
http://www.securityfocus.com/bid/31681
32036
http://secunia.com/advisories/32036
32222
http://secunia.com/advisories/32222
33330
http://secunia.com/advisories/33330
3636
http://securityreason.com/securityalert/3636
37460
http://secunia.com/advisories/37460
44183
57126
http://secunia.com/advisories/57126
ADV-2008-0488
http://www.vupen.com/english/advisories/2008/0488
ADV-2008-1856
http://www.vupen.com/english/advisories/2008/1856/references
ADV-2008-1981
ADV-2008-2690
http://www.vupen.com/english/advisories/2008/2690
ADV-2008-2780
http://www.vupen.com/english/advisories/2008/2780
ADV-2009-3316
http://www.vupen.com/english/advisories/2009/3316
APPLE-SA-2008-06-30
APPLE-SA-2008-10-09
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
FEDORA-2008-1467
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
FEDORA-2008-1603
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html
GLSA-200804-10
http://security.gentoo.org/glsa/glsa-200804-10.xml
HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
IZ20133
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133
IZ20991
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991
JVN#09470767
http://jvn.jp/jp/JVN%2309470767/index.html
MDVSA-2009:018
http://www.mandriva.com/security/advisories?name=MDVSA-2009:018
MDVSA-2010:176
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
SUSE-SR:2009:004
[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
http://support.apple.com/kb/HT2163
http://support.apple.com/kb/HT3216
http://tomcat.apache.org/security-4.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://www-01.ibm.com/support/docview.wss?uid=swg24018932
http://www-01.ibm.com/support/docview.wss?uid=swg27012047
http://www-01.ibm.com/support/docview.wss?uid=swg27012048
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html
http://www.vmware.com/security/advisories/VMSA-2008-0010.html
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
https://bugzilla.redhat.com/show_bug.cgi?id=532111
oval:org.mitre.oval:def:11177
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11177
Common Vulnerability Exposure (CVE) ID: CVE-2008-5515
20090608 [SECURITY] CVE-2008-5515 RequestDispatcher directory traversal vulnerability
http://www.securityfocus.com/archive/1/504170/100/0/threaded
20090610 [SECURITY] UPDATED CVE-2008-5515 RequestDispatcher directory traversal vulnerability
http://www.securityfocus.com/archive/1/504202/100/0/threaded
263529
http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1
35263
http://www.securityfocus.com/bid/35263
35393
http://secunia.com/advisories/35393
35685
http://secunia.com/advisories/35685
35788
http://secunia.com/advisories/35788
39317
http://secunia.com/advisories/39317
42368
http://secunia.com/advisories/42368
ADV-2009-1520
http://www.vupen.com/english/advisories/2009/1520
ADV-2009-1535
http://www.vupen.com/english/advisories/2009/1535
ADV-2009-1856
http://www.vupen.com/english/advisories/2009/1856
ADV-2010-3056
http://www.vupen.com/english/advisories/2010/3056
APPLE-SA-2010-03-29-1
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
DSA-2207
http://www.debian.org/security/2011/dsa-2207
FEDORA-2009-11352
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html
FEDORA-2009-11356
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html
FEDORA-2009-11374
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html
HPSBMA02535
http://marc.info/?l=bugtraq&m=127420533226623&w=2
HPSBUX02579
http://marc.info/?l=bugtraq&m=129070310906557&w=2
HPSBUX02860
http://marc.info/?l=bugtraq&m=136485229118404&w=2
JVN#63832775
http://jvn.jp/en/jp/JVN63832775/index.html
MDVSA-2009:136
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
MDVSA-2009:138
http://www.mandriva.com/security/advisories?name=MDVSA-2009:138
SSRT100029
SSRT100203
SSRT101146
SUSE-SR:2009:012
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
SUSE-SR:2010:008
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
http://support.apple.com/kb/HT4077
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html
oval:org.mitre.oval:def:10422
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10422
oval:org.mitre.oval:def:19452
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19452
oval:org.mitre.oval:def:6445
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6445
Common Vulnerability Exposure (CVE) ID: CVE-2009-0033
1022331
http://securitytracker.com/id?1022331
20090603 [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector
http://www.securityfocus.com/archive/1/504044/100/0/threaded
35193
http://www.securityfocus.com/bid/35193
35326
http://secunia.com/advisories/35326
35344
http://secunia.com/advisories/35344
ADV-2009-1496
http://www.vupen.com/english/advisories/2009/1496
HPSBOV02762
http://marc.info/?l=bugtraq&m=133469267822771&w=2
JVN#87272440
http://jvn.jp/en/jp/JVN87272440/index.html
SSRT100825
http://svn.apache.org/viewvc?rev=742915&view=rev
http://svn.apache.org/viewvc?rev=781362&view=rev
oval:org.mitre.oval:def:10231
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231
oval:org.mitre.oval:def:19110
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110
oval:org.mitre.oval:def:5739
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739
tomcat-ajp-dos(50928)
https://exchange.xforce.ibmcloud.com/vulnerabilities/50928
Common Vulnerability Exposure (CVE) ID: CVE-2009-0580
1022332
http://securitytracker.com/id?1022332
20090603 [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication
http://www.securityfocus.com/archive/1/504045/100/0/threaded
20090604 Re: [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication
http://www.securityfocus.com/archive/1/504108/100/0/threaded
20090605 [SECURITY] CVE-2009-0580 UPDATED Apache Tomcat User enumeration vulnerability with FORM authentication
http://www.securityfocus.com/archive/1/504125/100/0/threaded
35196
http://www.securityfocus.com/bid/35196
http://svn.apache.org/viewvc?rev=747840&view=rev
http://svn.apache.org/viewvc?rev=781379&view=rev
http://svn.apache.org/viewvc?rev=781382&view=rev
oval:org.mitre.oval:def:18915
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18915
oval:org.mitre.oval:def:6628
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6628
oval:org.mitre.oval:def:9101
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9101
tomcat-jsecuritycheck-info-disclosure(50930)
https://exchange.xforce.ibmcloud.com/vulnerabilities/50930
Common Vulnerability Exposure (CVE) ID: CVE-2009-0783
1022336
http://www.securitytracker.com/id?1022336
20090604 [SECURITY] CVE-2009-0783 Apache Tomcat Information disclosure
http://www.securityfocus.com/archive/1/504090/100/0/threaded
35416
http://www.securityfocus.com/bid/35416
http://svn.apache.org/viewvc?rev=652592&view=rev
http://svn.apache.org/viewvc?rev=681156&view=rev
http://svn.apache.org/viewvc?rev=739522&view=rev
http://svn.apache.org/viewvc?rev=781542&view=rev
http://svn.apache.org/viewvc?rev=781708&view=rev
https://issues.apache.org/bugzilla/show_bug.cgi?id=29936
https://issues.apache.org/bugzilla/show_bug.cgi?id=45933
oval:org.mitre.oval:def:10716
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10716
oval:org.mitre.oval:def:18913
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18913
oval:org.mitre.oval:def:6450
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6450
tomcat-xml-information-disclosure(51195)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51195
Common Vulnerability Exposure (CVE) ID: CVE-2009-2693
BugTraq ID: 37944
http://www.securityfocus.com/bid/37944
Bugtraq: 20100124 [SECURITY] CVE-2009-2693 Apache Tomcat unexpected file deletion and/or alteration (Google Search)
http://www.securityfocus.com/archive/1/509148/100/0/threaded
Bugtraq: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (Google Search)
http://www.securityfocus.com/archive/1/516397/100/0/threaded
Debian Security Information: DSA-2207 (Google Search)
HPdes Security Advisory: HPSBMA02535
HPdes Security Advisory: HPSBOV02762
HPdes Security Advisory: HPSBST02955
HPdes Security Advisory: HPSBUX02541
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113
HPdes Security Advisory: HPSBUX02860
HPdes Security Advisory: SSRT100029
HPdes Security Advisory: SSRT100145
HPdes Security Advisory: SSRT100825
HPdes Security Advisory: SSRT101146
http://www.mandriva.com/security/advisories?name=MDVSA-2010:177
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19355
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7017
http://www.redhat.com/support/errata/RHSA-2010-0119.html
http://www.redhat.com/support/errata/RHSA-2010-0580.html
http://www.redhat.com/support/errata/RHSA-2010-0582.html
http://securitytracker.com/id?1023505
http://secunia.com/advisories/38316
http://secunia.com/advisories/38346
http://secunia.com/advisories/38541
http://secunia.com/advisories/38687
http://secunia.com/advisories/40330
http://secunia.com/advisories/40813
http://secunia.com/advisories/43310
SuSE Security Announcement: SUSE-SR:2010:008 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1700 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html
SuSE Security Announcement: openSUSE-SU-2012:1701 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html
SuSE Security Announcement: openSUSE-SU-2013:0147 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html
http://ubuntu.com/usn/usn-899-1
http://www.vupen.com/english/advisories/2010/0213
http://www.vupen.com/english/advisories/2010/1559
http://www.vupen.com/english/advisories/2010/1986
XForce ISS Database: tomcat-war-directory-traversal(55855)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55855
Common Vulnerability Exposure (CVE) ID: CVE-2009-2901
1023503
http://securitytracker.com/id?1023503
20100124 [SECURITY] CVE-2009-2901 Apache Tomcat insecure partial deploy after failed undeploy
http://www.securityfocus.com/archive/1/509151/100/0/threaded
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
37942
http://www.securityfocus.com/bid/37942
38316
38346
38541
43310
ADV-2010-0213
MDVSA-2010:177
USN-899-1
http://svn.apache.org/viewvc?rev=892815&view=rev
http://svn.apache.org/viewvc?rev=902650&view=rev
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
openSUSE-SU-2012:1700
openSUSE-SU-2012:1701
openSUSE-SU-2013:0147
tomcat-autodeploy-security-bypass(55856)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55856
Common Vulnerability Exposure (CVE) ID: CVE-2009-2902
1023504
http://securitytracker.com/id?1023504
20100124 [SECURITY] CVE-2009-2902 Apache Tomcat unexpected file deletion in work directory
http://www.securityfocus.com/archive/1/509150/100/0/threaded
37945
http://www.securityfocus.com/bid/37945
38687
40330
40813
ADV-2010-1559
ADV-2010-1986
HPSBUX02541
RHSA-2010:0119
RHSA-2010:0580
RHSA-2010:0582
SSRT100145
apache-tomcat-war-directory-traversal(55857)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55857
oval:org.mitre.oval:def:19431
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431
oval:org.mitre.oval:def:7092
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092
Common Vulnerability Exposure (CVE) ID: CVE-2010-1157
20100421 [SECURITY] CVE-2010-1157: Apache Tomcat information disclosure vulnerability
http://www.securityfocus.com/archive/1/510879/100/0/threaded
39574
http://secunia.com/advisories/39574
39635
http://www.securityfocus.com/bid/39635
ADV-2010-0980
http://www.vupen.com/english/advisories/2010/0980
APPLE-SA-2011-10-12-3
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
RHSA-2011:0896
http://www.redhat.com/support/errata/RHSA-2011-0896.html
RHSA-2011:0897
http://www.redhat.com/support/errata/RHSA-2011-0897.html
SUSE-SR:2010:017
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://support.apple.com/kb/HT5002
http://svn.apache.org/viewvc?view=revision&revision=936540
http://svn.apache.org/viewvc?view=revision&revision=936541
oval:org.mitre.oval:def:19492
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19492
Common Vulnerability Exposure (CVE) ID: CVE-2010-2227
BugTraq ID: 41544
http://www.securityfocus.com/bid/41544
Bugtraq: 20100709 [SECURITY] CVE-2010-2227: Apache Tomcat Remote Denial Of Service and Information Disclosure Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/512272/100/0/threaded
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050207.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050214.html
HPdes Security Advisory: HPSBUX02579
HPdes Security Advisory: SSRT100203
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18532
http://www.redhat.com/support/errata/RHSA-2010-0581.html
http://www.redhat.com/support/errata/RHSA-2010-0583.html
http://securitytracker.com/id?1024180
http://secunia.com/advisories/41025
http://secunia.com/advisories/42079
http://secunia.com/advisories/42454
SuSE Security Announcement: SUSE-SR:2010:017 (Google Search)
http://www.vupen.com/english/advisories/2010/2868
XForce ISS Database: tomcat-transferencoding-dos(60264)
https://exchange.xforce.ibmcloud.com/vulnerabilities/60264
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.