tomcat-jsvc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tomcat-jsvc package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
HTTP Request Smuggling

<0:7.0.76-16.el7_9
  • H
Session Fixation

<0:7.0.76-15.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:7.0.76-15.el7
  • H
Deserialization of Untrusted Data

<0:7.0.76-12.el7_8
  • H
CVE-2020-1938

<0:7.0.76-11.el7_7
  • M
CVE-2018-1304

<0:7.0.76-9.el7
  • M
CVE-2018-1305

<0:7.0.76-9.el7
  • M
Improper Certificate Validation

<0:7.0.76-9.el7
  • M
Insecure Default Initialization of Resource

<0:7.0.76-9.el7
  • M
Open Redirect

<0:7.0.76-9.el7_6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:7.0.76-8.el7_5
  • H
Insufficient Verification of Data Authenticity

<0:7.0.76-3.el7_4
  • H
Unrestricted Upload of File with Dangerous Type

<0:7.0.76-3.el7_4
  • H
Information Exposure

<0:7.0.76-3.el7_4
  • H
Unrestricted Upload of File with Dangerous Type

<0:7.0.76-3.el7_4
  • L
Incorrect Authorization

<0:7.0.76-2.el7
  • L
CVE-2016-5018

<0:7.0.76-2.el7
  • L
CVE-2016-6796

<0:7.0.76-2.el7
  • L
CVE-2016-6794

<0:7.0.76-2.el7
  • L
Information Exposure

<0:7.0.76-2.el7
  • H
Improper Handling of Exceptional Conditions

<0:7.0.69-12.el7_3
  • H
Exposure of Resource to Wrong Sphere

<0:7.0.69-12.el7_3
  • M
Error Handling

<0:7.0.69-11.el7_3
  • M
Improper Input Validation

<0:7.0.69-11.el7_3
  • M
Cross-site Request Forgery (CSRF)

<0:7.0.69-10.el7
  • M
Access Restriction Bypass

<0:7.0.69-10.el7
  • M
Improper Input Validation

<0:7.0.69-10.el7
  • H
CVE-2015-5346

<0:7.0.54-8.el7_2
  • M
Directory Traversal

<0:7.0.69-10.el7
  • M
Directory Traversal

<0:7.0.69-10.el7
  • M
Information Exposure

<0:7.0.69-10.el7
  • H
Improper Access Control

<0:7.0.54-8.el7_2
  • M
Access Restriction Bypass

<0:7.0.69-10.el7
  • H
Incorrect Default Permissions

<0:7.0.54-8.el7_2
  • H
Access Restriction Bypass

<0:7.0.54-8.el7_2
  • H
Improper Access Control

<0:7.0.54-8.el7_2
  • M
Improper Data Handling

<0:7.0.54-2.el7_1
  • L
Access Restriction Bypass

<0:7.0.42-8.el7_0
  • M
Numeric Errors

<0:7.0.42-6.el7_0
  • M
Access Restriction Bypass

<0:7.0.42-6.el7_0
  • M
Numeric Errors

<0:7.0.42-6.el7_0
  • H
CVE-2014-0186

<0:7.0.42-5.el7_0
  • H
Improper Input Validation

<0:7.0.42-5.el7_0
  • H
Improper Input Validation

<0:7.0.42-5.el7_0