FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-29 07:54:42 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
0b9af110-d529-11e6-ae1b-002590263bf5tomcat -- multiple vulnerabilities

The Apache Software Foundation reports:

Important: Remote Code Execution CVE-2016-8735

Important: Information Disclosure CVE-2016-6816


Discovery 2016-11-22
Entry 2017-01-07
Modified 2017-03-18
tomcat
< 6.0.48

tomcat7
< 7.0.73

tomcat8
< 8.0.39

CVE-2016-8735
CVE-2016-6816
ports/214599
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39
134acaa2-51ef-11e2-8e34-0022156e8794tomcat -- denial of service

The Apache Software Foundation reports:

When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service.


Discovery 2012-12-04
Entry 2012-12-04
Modified 2017-03-18
tomcat
ge 6.0.0 le 6.0.35

tomcat7
ge 7.0.0 le 7.0.27

CVE-2012-4534
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
152e4c7e-2a2e-11e2-99c7-00a0d181e71dtomcat -- authentication weaknesses

The Apache Software Foundation reports:

Three weaknesses in Tomcat's implementation of DIGEST authentication were identified and resolved:

  • Tomcat tracked client rather than server nonces and nonce count.
  • When a session ID was present, authentication was bypassed.
  • The user name and password were not checked before when indicating that a nonce was stale.

These issues reduced the security of DIGEST authentication making replay attacks possible in some circumstances.

The first issue was identified by Tilmann Kuhn. The second and third issues were identified by the Tomcat security team during the code review resulting from the first issue.


Discovery 2012-11-05
Entry 2012-11-08
Modified 2012-11-09
tomcat
gt 5.5.0 lt 5.5.36

gt 6.0.0 lt 6.0.36

gt 7.0.0 lt 7.0.30

CVE-2012-3439
http://tomcat.apache.org/security.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
1f1124fe-de5c-11e5-8fa8-14dae9d210b8tomcat -- multiple vulnerabilities

Mark Thomas reports:

  • CVE-2015-5345 Apache Tomcat Directory disclosure

  • CVE-2016-0706 Apache Tomcat Security Manager bypass

  • CVE-2016-0714 Apache Tomcat Security Manager Bypass


Discovery 2016-02-22
Entry 2016-02-28
Modified 2017-03-18
tomcat
< 6.0.45

tomcat7
< 7.0.68

tomcat8
< 8.0.30

http://mail-archives.apache.org/mod_mbox/www-announce/201602.mbox/%3c56CAEF96.7070701@apache.org%3e
http://mail-archives.apache.org/mod_mbox/www-announce/201602.mbox/%3c56CAEF6A.70703@apache.org%3e
http://mail-archives.apache.org/mod_mbox/www-announce/201602.mbox/%3c56CAEF4F.5090003@apache.org%3e
CVE-2015-5345
CVE-2015-5346
CVE-2016-0706
CVE-2016-0714
25e0593d-13c0-11e5-9afb-3c970e169bc2tomcat -- multiple vulnerabilities

Apache Software Foundation reports:

Low: Denial of Service CVE-2014-0230

When a response for a request with a request body is returned to the user agent before the request body is fully read, by default Tomcat swallows the remaining request body so that the next request on the connection may be processed. There was no limit to the size of request body that Tomcat would swallow. This permitted a limited Denial of Service as Tomcat would never close the connection and a processing thread would remain allocated to the connection.

Moderate: Security Manager bypass CVE-2014-7810

Malicious web applications could use expression language to bypass the protections of a Security Manager as expressions were evaluated within a privileged code section.


Discovery 2015-05-12
Entry 2015-06-16
Modified 2017-03-18
tomcat
< 6.0.44

tomcat7
< 7.0.55

tomcat8
< 8.0.9

hadoop2
le 2.6.0

oozie
le 4.1.0

CVE-2014-0230
CVE-2014-7810
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
3383e706-4fc3-11df-83fb-0015587e2cc1tomcat -- information disclosure vulnerability

The Apache software foundation reports:

The "WWW-Authenticate" header for BASIC and DIGEST authentication includes a realm name. If a element is specified for the application in web.xml it will be used. However, a is not specified then Tomcat will generate one.

In some circumstances this can expose the local hostname or IP address of the machine running Tomcat.


Discovery 2010-04-22
Entry 2010-04-24
tomcat
gt 5.5.0 lt 5.5.30

gt 6.0.0 lt 6.0.27

CVE-2010-1157
ports/146022
http://seclists.org/bugtraq/2010/Apr/200
3ae106e2-d521-11e6-ae1b-002590263bf5tomcat -- multiple vulnerabilities

The Apache Software Foundation reports:

Low: Unrestricted Access to Global Resources CVE-2016-6797

Low: Security Manager Bypass CVE-2016-6796

Low: System Property Disclosure CVE-2016-6794

Low: Security Manager Bypass CVE-2016-5018

Low: Timing Attack CVE-2016-0762


Discovery 2016-10-27
Entry 2017-01-07
Modified 2017-03-18
tomcat
< 6.0.47

tomcat7
< 7.0.72

tomcat8
< 8.0.37

CVE-2016-6797
CVE-2016-6796
CVE-2016-6794
CVE-2016-5018
CVE-2016-0762
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
4ca26574-2a2c-11e2-99c7-00a0d181e71dtomcat -- Denial of Service

The Apache Software Foundation reports:

The checks that limited the permitted size of request headers were implemented too late in the request parsing process for the HTTP NIO connector. This enabled a malicious user to trigger an OutOfMemoryError by sending a single request with very large headers. This issue was identified by Josh Spiewak.


Discovery 2012-11-05
Entry 2012-11-08
Modified 2012-11-09
tomcat
gt 6.0.0 lt 6.0.36

gt 7.0.0 lt 7.0.28

CVE-2012-2733
http://tomcat.apache.org/security.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
553ec4ed-38d6-11e0-94b1-000c29ba66d2tomcat -- Cross-site scripting vulnerability

The Tomcat security team reports:

The HTML Manager interface displayed web applciation provided data, such as display names, without filtering. A malicious web application could trigger script execution by an administartive user when viewing the manager pages.


Discovery 2010-11-12
Entry 2011-02-15
Modified 2011-09-30
tomcat
gt 5.5.0 lt 5.5.32

tomcat
gt 6.0.0 lt 6.0.30

tomcat
gt 7.0.0 lt 7.0.6

CVE-2011-0013
http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.32
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.30
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.6
553ec4ed-38d6-11e0-94b1-000c29ba66d2tomcat -- Cross-site scripting vulnerability

The Tomcat security team reports:

The HTML Manager interface displayed web applciation provided data, such as display names, without filtering. A malicious web application could trigger script execution by an administartive user when viewing the manager pages.


Discovery 2010-11-12
Entry 2011-02-15
Modified 2011-09-30
tomcat
gt 5.5.0 lt 5.5.32

tomcat
gt 6.0.0 lt 6.0.30

tomcat
gt 7.0.0 lt 7.0.6

CVE-2011-0013
http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.32
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.30
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.6
553ec4ed-38d6-11e0-94b1-000c29ba66d2tomcat -- Cross-site scripting vulnerability

The Tomcat security team reports:

The HTML Manager interface displayed web applciation provided data, such as display names, without filtering. A malicious web application could trigger script execution by an administartive user when viewing the manager pages.


Discovery 2010-11-12
Entry 2011-02-15
Modified 2011-09-30
tomcat
gt 5.5.0 lt 5.5.32

tomcat
gt 6.0.0 lt 6.0.30

tomcat
gt 7.0.0 lt 7.0.6

CVE-2011-0013
http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.32
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.30
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.6
556fdf03-6785-11ed-953b-002b67dfc673Tomcat -- Request Smuggling

Apache Tomcat reports:

If Tomcat was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.

The CVSS score for this vulnerability is 7.5 High


Discovery 2022-10-31
Entry 2022-11-18
tomcat
ge 8.5.0 lt 8.5.83

ge 9.0.0-M1 lt 9.0.68

ge 10.0.0-M1 lt 10.0.27

ge 10.1.0-M1 lt 10.1.1

tomcat85
ge 8.5.0 lt 8.5.83

tomcat9
ge 9.0.0-M1 lt 9.0.68

tomcat10
ge 10.0.0-M1 lt 10.0.27

tomcat101
ge 10.1.0-M1 lt 10.1.1

tomcat-devel
ge 10.1.0-M1 lt 10.1.1

CVE-2022-42252
https://nvd.nist.gov/vuln/detail/CVE-2022-42252
55c4233e-1844-11e8-a712-0025908740c2tomcat -- Security constraints ignored or applied too late

The Apache Software Foundation reports:

Security constraints defined by annotations of Servlets were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.


Discovery 2018-02-23
Entry 2018-02-23
tomcat
ge 7.0.0 le 7.0.84

ge 8.0.0 le 8.0.49

ge 8.5.0 le 8.5.27

ge 9.0.0 le 9.0.4

http://tomcat.apache.org/security-9.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-7.html
CVE-2018-1304
CVE-2018-1305
7f5ccb1d-439b-11e1-bc16-0023ae8e59f0tomcat -- Denial of Service

The Tomcat security team reports:

Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.


Discovery 2011-10-21
Entry 2012-01-17
tomcat
gt 5.5.0 lt 5.5.35

tomcat
gt 6.0.0 lt 6.0.34

tomcat
gt 7.0.0 lt 7.0.23

CVE-2012-0022
http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.35
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.34
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.23
7f5ccb1d-439b-11e1-bc16-0023ae8e59f0tomcat -- Denial of Service

The Tomcat security team reports:

Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.


Discovery 2011-10-21
Entry 2012-01-17
tomcat
gt 5.5.0 lt 5.5.35

tomcat
gt 6.0.0 lt 6.0.34

tomcat
gt 7.0.0 lt 7.0.23

CVE-2012-0022
http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.35
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.34
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.23
7f5ccb1d-439b-11e1-bc16-0023ae8e59f0tomcat -- Denial of Service

The Tomcat security team reports:

Analysis of the recent hash collision vulnerability identified unrelated inefficiencies with Apache Tomcat's handling of large numbers of parameters and parameter values. These inefficiencies could allow an attacker, via a specially crafted request, to cause large amounts of CPU to be used which in turn could create a denial of service. The issue was addressed by modifying the Tomcat parameter handling code to efficiently process large numbers of parameters and parameter values.


Discovery 2011-10-21
Entry 2012-01-17
tomcat
gt 5.5.0 lt 5.5.35

tomcat
gt 6.0.0 lt 6.0.34

tomcat
gt 7.0.0 lt 7.0.23

CVE-2012-0022
http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.35
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.34
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.23
81fc1076-1286-11e4-bebd-000c2980a9f3tomcat -- multiple vulnerabilities

Tomcat Security Team reports:

Tomcat does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

An integer overflow, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

An integer overflow in parseChunkHeader allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.


Discovery 2014-05-23
Entry 2014-07-23
Modified 2017-03-18
tomcat
< 6.0.40

tomcat7
< 7.0.53

tomcat8
< 8.0.4

CVE-2014-0096
CVE-2014-0099
CVE-2014-0075
https://tomcat.apache.org/security-6.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
872623af-39ec-11dc-b8cc-000fea449b8atomcat -- multiple vulnerabilities

Apache Project reports:

The Apache Tomcat team is proud to announce the immediate availability of Tomcat 4.1.36 stable. This build contains numerous library updates, A small number of bug fixes and two important security fixes.


Discovery 2007-04-27
Entry 2007-07-24
apache-tomcat
ge 4.1.0 lt 4.1.36

gt 6.0.0 lt 6.0.11

tomcat
gt 5.0.0 lt 5.5.23

jakarta-tomcat
ge 4.0.0 lt 4.1.0

gt 5.0.0 lt 5.5.23

CVE-2005-2090
CVE-2007-0450
CVE-2007-1358
953911fe-51ef-11e2-8e34-0022156e8794tomcat -- bypass of CSRF prevention filter

The Apache Software Foundation reports:

The CSRF prevention filter could be bypassed if a request was made to a protected resource without a session identifier present in the request.


Discovery 2012-12-04
Entry 2012-12-04
Modified 2017-03-18
tomcat
ge 6.0.0 le 6.0.35

tomcat7
ge 7.0.0 le 7.0.31

CVE-2012-4431
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
ab2575d6-39f0-11dc-b8cc-000fea449b8atomcat -- XSS vulnerability in sample applications

The Apache Project reports:

The JSP and Servlet included in the sample application within the Tomcat documentation webapp did not escape user provided data before including it in the output. This enabled a XSS attack. These pages have been simplified not to use any user provided data in the output.


Discovery 2007-05-19
Entry 2007-07-24
apache-tomcat
gt 6.0.0 lt 6.0.11

tomcat
gt 5.0.0 lt 5.5.24

jakarta-tomcat
gt 5.0.0 lt 5.5.24

CVE-2007-1355
24058
c0dae634-4820-4505-850d-b1c975d0f67dtomcat -- Remote Code Execution

tomcat developers reports:

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.


Discovery 2017-10-04
Entry 2017-10-06
tomcat
ge 7.0.0 le 7.0.81

ge 8.0.0 le 8.0.46

ge 8.5.0 le 8.5.22

ge 9.0.0 lt 9.0.1

http://www.securityfocus.com/bid/100954
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E
CVE-2017-12617
e2e7faf9-1b51-11ed-ae46-002b67dfc673Tomcat -- XSS in examples web application

Apache Tomcat reports:

The Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.


Discovery 2022-06-22
Entry 2022-08-14
tomcat
ge 8.5.50 lt 8.5.81

ge 9.0.30 lt 9.0.64

ge 10.0.0-M1 lt 10.0.22

ge 10.1.0-M1 lt 10.1.0-M16

tomcat85
ge 8.5.50 lt 8.5.81

tomcat9
ge 9.0.30 lt 9.0.64

tomcat10
ge 10.0.0-M1 lt 10.0.22

tomcat-devel
ge 10.1.0-M1 lt 10.1.0-M16

CVE-2022-34305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34305
e5ec2767-d529-11e6-ae1b-002590263bf5tomcat -- information disclosure vulnerability

The Apache Software Foundation reports:

Important: Information Disclosure CVE-2016-8745


Discovery 2017-01-05
Entry 2017-01-07
Modified 2017-03-18
tomcat
< 6.0.49

tomcat7
< 7.0.74

tomcat8
< 8.0.40

CVE-2016-8745
ports/215865
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40
f599dfc4-3ec2-11e2-8ae1-001a8056d0b5tomcat -- bypass of security constraints

The Apache Software Foundation reports:

When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending "/j_security_check" to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to FormAuthenticator#authenticate().


Discovery 2012-12-04
Entry 2012-12-04
Modified 2017-03-18
tomcat
ge 6.0.0 le 6.0.35

tomcat7
ge 7.0.0 le 7.0.29

CVE-2012-3546
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html