- Home
- CVEs with nessus.description==According to its self-reported version number, the instance of Apache
Tomcat 4.x listening on the remote host is prior to 4.1.32. It is,
therefore, affected by the following vulnerabilities :
- The remote Apache Tomcat install is vulnerable to a
denial of service attack. If directory listing is
enabled, function calls to retrieve the contents of
large directories can degrade performance.
(CVE-2005-3510)
- The remote Apache Tomcat install may be vulnerable to
a cross-site scripting attack if the JSP examples are
enabled. Several of these JSP examples do not properly
validate user input. (CVE-2005-4838)
- The remote Apache Tomcat install allows remote users
to list the contents of a directory by placing a
semicolon before a filename with a mapped extension.
(CVE-2006-3835)
- If enabled, the JSP calendar example application is
vulnerable to a cross-site scripting attack because
user input is not properly validated. (CVE-2006-7196)
- The remote Apache Tomcat install, in its default
configuration, permits the use of insecure ciphers when
using SSL. (CVE-2007-1858)
- The remote Apache Tomcat install may be vulnerable to an
information disclosure attack by allowing requests from
a non-permitted IP address to gain access to a context
that is protected with a valve that extends
RequestFilterValve. (CVE-2008-3271)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top