tomcat8 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tomcat8 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

*
  • H
Deserialization of Untrusted Data

<8.0.14-1+deb8u17
  • M
HTTP Request Smuggling

<8.0.14-1+deb8u17
  • C
Improper Input Validation

<8.0.14-1+deb8u17
  • H
Insufficiently Protected Credentials

<8.0.14-1+deb8u16
  • H
Session Fixation

<8.0.14-1+deb8u17
  • M
Cross-site Scripting (XSS)

<8.0.14-1+deb8u15
  • M
Open Redirect

<8.0.14-1+deb8u14
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<8.0.14-1+deb8u13
  • H
Improper Certificate Validation

<8.0.14-1+deb8u13
  • C
Insecure Default Initialization of Resource

<8.0.14-1+deb8u15
  • M
CVE-2018-1304

<8.0.14-1+deb8u12
  • M
CVE-2018-1305

<8.0.14-1+deb8u12
  • H
Security Features

<8.0.14-1+deb8u4
  • M
Insufficient Verification of Data Authenticity

<8.0.14-1+deb8u11
  • H
Error Handling

<8.0.14-1+deb8u6
  • H
Improper Access Control

<8.0.14-1+deb8u4
  • M
Access Restriction Bypass

<8.0.14-1+deb8u4
  • C
Security Features

<8.0.14-1+deb8u4
  • M
Information Exposure

<8.0.14-1+deb8u4
  • H
Improper Handling of Exceptional Conditions

<8.0.14-1+deb8u10
  • H
Information Exposure

<8.0.14-1+deb8u9
  • C
Exposure of Resource to Wrong Sphere

<8.0.14-1+deb8u9
  • C
Improper Access Control

<8.0.14-1+deb8u5
  • H
Link Following

<8.0.14-1+deb8u5
  • H
Access Restriction Bypass

<8.0.14-1+deb8u5
  • H
Improper Input Validation

<8.0.14-1+deb8u5
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<8.0.14-1+deb8u7
  • H
Improper Input Validation

<8.0.14-1+deb8u3
  • H
Improper Access Control

<8.0.14-1+deb8u15
  • H
Improper Input Validation

<8.0.14-1+deb8u2
  • H
Cross-site Request Forgery (CSRF)

<8.0.14-1+deb8u2
  • M
Information Exposure

<8.0.14-1+deb8u2
  • H
CVE-2015-5346

<8.0.14-1+deb8u2
  • M
Access Restriction Bypass

<8.0.14-1+deb8u2
  • M
Directory Traversal

<8.0.14-1+deb8u2
  • H
Access Restriction Bypass

<8.0.14-1+deb8u2
  • M
Directory Traversal

<8.0.14-1+deb8u2
  • M
Improper Access Control

<8.0.14-1+deb8u1
  • H
Resource Management Errors

<8.0.9-1
  • M
Improper Data Handling

<8.0.9-1
  • M
Improper Input Validation

<8.0.5-1
  • M
Access Restriction Bypass

<8.0.5-1
  • M
Access Restriction Bypass

<8.0.8-1
  • M
Numeric Errors

<8.0.5-1
  • M
Numeric Errors

<8.0.5-1
  • M
Improper Input Validation

<8.0.0
  • M
Improper Input Validation

<8.0.0
  • M
Information Exposure

<8.0.0