tomcat6-servlet-2.5-api vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tomcat6-servlet-2.5-api package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Deserialization of Untrusted Data

<0:6.0.24-115.el6_10
  • H
CVE-2020-1938

<0:6.0.24-114.el6_10
  • H
Unrestricted Upload of File with Dangerous Type

<0:6.0.24-111.el6_9
  • H
Information Exposure

<0:6.0.24-111.el6_9
  • H
Unrestricted Upload of File with Dangerous Type

<0:6.0.24-111.el6_9
  • H
Improper Handling of Exceptional Conditions

<0:6.0.24-111.el6_9
  • M
Error Handling

<0:6.0.24-105.el6_8
  • M
Improper Input Validation

<0:6.0.24-105.el6_8
  • H
Directory Traversal

<0:6.0.24-98.el6_8
  • H
Directory Traversal

<0:6.0.24-98.el6_8
  • H
Information Exposure

<0:6.0.24-98.el6_8
  • H
Improper Access Control

<0:6.0.24-98.el6_8
  • H
Access Restriction Bypass

<0:6.0.24-98.el6_8
  • H
Access Restriction Bypass

<0:6.0.24-98.el6_8
  • M
Improper Access Control

<0:6.0.24-94.el6_7
  • M
Improper Data Handling

<0:6.0.24-83.el6_6
  • L
Information Exposure

<0:6.0.24-78.el6_5
  • L
Access Restriction Bypass

<0:6.0.24-78.el6_5
  • M
Numeric Errors

<0:6.0.24-72.el6_5
  • M
Access Restriction Bypass

<0:6.0.24-72.el6_5
  • M
Numeric Errors

<0:6.0.24-72.el6_5
  • M
Access Restriction Bypass

<0:6.0.24-64.el6_5
  • M
Improper Input Validation

<0:6.0.24-64.el6_5
  • M
Improper Input Validation

<0:6.0.24-64.el6_5
  • M
Improper Authentication

<0:6.0.24-57.el6_4
  • H
Access Restriction Bypass

<0:6.0.24-55.el6_4
  • H
Link Following

<0:6.0.24-55.el6_4
  • H
Improper Authentication

<0:6.0.24-52.el6_4
  • H
Access Restriction Bypass

<0:6.0.24-52.el6_4
  • H
Resource Management Errors

<0:6.0.24-52.el6_4
  • H
Improper Authentication

<0:6.0.24-52.el6_4
  • H
Access Restriction Bypass

<0:6.0.24-52.el6_4
  • M
Numeric Errors

<0:6.0.24-36.el6_2
  • M
Resource Management Errors

<0:6.0.24-36.el6_2
  • M
Access Restriction Bypass

<0:6.0.24-35.el6_1
  • M
Information Exposure

<0:6.0.24-35.el6_1
  • M
Cryptographic Issues

<0:6.0.24-35.el6_1
  • M
Access Restriction Bypass

<0:6.0.24-35.el6_1
  • M
Improper Input Validation

<0:6.0.24-35.el6_1
  • M
Access Restriction Bypass

<0:6.0.24-35.el6_1
  • M
Improper Authentication

<0:6.0.24-35.el6_1
  • M
Cross-site Scripting (XSS)

<0:6.0.24-33.el6
  • M
Cross-site Scripting (XSS)

<0:6.0.24-33.el6
  • M
CVE-2010-3718

<0:6.0.24-33.el6
  • H
Resource Management Errors

<0:6.0.24-24.el6_0
  • H
CVE-2010-4476

<0:6.0.24-24.el6_0