Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
Apache Tomcat Insecure Default Initialization of Resource Vulnerability (CVE-2018-8014)
|
CVE-2018-8014
CWE-1188
|
CWE-1188
|
Critical
|
Apache Tomcat Insufficiently Protected Credentials Vulnerability (CVE-2019-12418)
|
CVE-2019-12418
CWE-522
|
CWE-522
|
High
|
Apache Tomcat Insufficient Verification of Data Authenticity Vulnerability (CVE-2017-7674)
|
CVE-2017-7674
CWE-345
|
CWE-345
|
Medium
|
Apache Tomcat Integer Overflow or Wraparound Vulnerability (CVE-2015-8751)
|
CVE-2015-8751
CWE-190
|
CWE-190
|
High
|
Apache Tomcat JK connector security bypass
|
CVE-2007-1860
CWE-200
|
CWE-200
|
High
|
Apache Tomcat Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1336)
|
CVE-2018-1336
CWE-835
|
CWE-835
|
High
|
Apache Tomcat Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2020-13935)
|
CVE-2020-13935
CWE-835
|
CWE-835
|
High
|
Apache Tomcat Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-41079)
|
CVE-2021-41079
CWE-835
|
CWE-835
|
High
|
Apache Tomcat Missing Release of Resource after Effective Lifetime Vulnerability (CVE-2021-42340)
|
CVE-2021-42340
CWE-772
|
CWE-772
|
High
|
Apache Tomcat Numeric Errors Vulnerability (CVE-2012-0022)
|
CVE-2012-0022
|
|
Medium
|
Apache Tomcat Numeric Errors Vulnerability (CVE-2014-0075)
|
CVE-2014-0075
|
|
Medium
|
Apache Tomcat Numeric Errors Vulnerability (CVE-2014-0099)
|
CVE-2014-0099
|
|
Medium
|
Apache Tomcat Off-by-one Error Vulnerability (CVE-2023-28709)
|
CVE-2023-28709
CWE-193
|
CWE-193
|
High
|
Apache Tomcat Other Vulnerability (CVE-2000-0672)
|
CVE-2000-0672
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2000-0759)
|
CVE-2000-0759
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2000-0760)
|
CVE-2000-0760
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2000-1210)
|
CVE-2000-1210
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2001-0590)
|
CVE-2001-0590
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2001-0829)
|
CVE-2001-0829
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2001-0917)
|
CVE-2001-0917
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2001-1563)
|
CVE-2001-1563
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2002-0682)
|
CVE-2002-0682
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2002-0935)
|
CVE-2002-0935
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2002-0936)
|
CVE-2002-0936
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2002-1148)
|
CVE-2002-1148
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2002-1394)
|
CVE-2002-1394
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2002-1567)
|
CVE-2002-1567
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2002-1895)
|
CVE-2002-1895
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2002-2006)
|
CVE-2002-2006
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2002-2007)
|
CVE-2002-2007
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2002-2008)
|
CVE-2002-2008
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2002-2009)
|
CVE-2002-2009
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2003-0042)
|
CVE-2003-0042
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2003-0043)
|
CVE-2003-0043
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2003-0044)
|
CVE-2003-0044
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2003-0045)
|
CVE-2003-0045
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2003-0866)
|
CVE-2003-0866
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2005-0808)
|
CVE-2005-0808
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2005-2090)
|
CVE-2005-2090
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2005-3510)
|
CVE-2005-3510
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2005-4703)
|
CVE-2005-4703
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2006-3835)
|
CVE-2006-3835
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2006-7195)
|
CVE-2006-7195
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2006-7197)
|
CVE-2006-7197
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2007-1355)
|
CVE-2007-1355
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2007-1858)
|
CVE-2007-1858
|
|
Low
|
Apache Tomcat Other Vulnerability (CVE-2007-2449)
|
CVE-2007-2449
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2007-3383)
|
CVE-2007-3383
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2007-3384)
|
CVE-2007-3384
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2007-6286)
|
CVE-2007-6286
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2008-0002)
|
CVE-2008-0002
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2010-3718)
|
CVE-2010-3718
|
|
Low
|
Apache Tomcat Other Vulnerability (CVE-2011-1088)
|
CVE-2011-1088
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2011-1183)
|
CVE-2011-1183
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2011-1419)
|
CVE-2011-1419
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2011-2481)
|
CVE-2011-2481
|
|
Medium
|
Apache Tomcat Other Vulnerability (CVE-2015-5346)
|
CVE-2015-5346
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2023-45648)
|
CVE-2023-45648
|
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-5342)
|
CVE-2007-5342
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3271)
|
CVE-2008-3271
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-2901)
|
CVE-2009-2901
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-1184)
|
CVE-2011-1184
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-1582)
|
CVE-2011-1582
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-2729)
|
CVE-2011-2729
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-3190)
|
CVE-2011-3190
CWE-264
|
CWE-264
|
High
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-3376)
|
CVE-2011-3376
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-5062)
|
CVE-2011-5062
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3546)
|
CVE-2012-3546
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4431)
|
CVE-2012-4431
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5885)
|
CVE-2012-5885
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-0346)
|
CVE-2013-0346
CWE-264
|
CWE-264
|
Low
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0050)
|
CVE-2014-0050
CWE-264
|
CWE-264
|
High
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0096)
|
CVE-2014-0096
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0119)
|
CVE-2014-0119
CWE-264
|
CWE-264
|
Medium
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0714)
|
CVE-2016-0714
CWE-264
|
CWE-264
|
High
|