FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-11-25 08:52:18 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
8b571fb2-f311-11eb-b12b-fc4dd43e2b6atomcat -- JNDI Realm Authentication Weakness in multiple versions

ilja.farber reports:

Queries made by the JNDI Realm did not always correctly escape parameters. Parameter values could be sourced from user provided data (eg user names) as well as configuration data provided by an administrator. In limited circumstances it was possible for users to authenticate using variations of their user name and/or to bypass some of the protection provided by the LockOut Realm.


Discovery 2021-04-08
Entry 2021-08-01
tomcat7
>= 7.0.0 le 7.0.108

tomcat85
>= 8.5.0 le 8.5.65

tomcat9
>= 9.0.0 le 9.0.45

tomcat10
>= 10.0.0 le 10.0.5

CVE-2021-30640
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30640
6a72eff7-ccd6-11ea-9172-4c72b94353b5Apache Tomcat -- Multiple Vulnerabilities

The Apache Software Foundation reports:

An h2c direct connection did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.

The payload length in a WebSocket frame was not correctly validated. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.

A specially crafted sequence of HTTP/2 requests could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.


Discovery 2020-07-05
Entry 2020-07-23
Modified 2020-07-23
tomcat7
< 7.0.105

tomcat85
< 8.5.57

tomcat9
< 9.0.37

tomcat-devel
< 10.0.0.M7

https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://tomcat.apache.org/security-10.html
CVE-2020-11996
CVE-2020-13934
CVE-2020-13935