Total vulnerabilities in the database
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
Software | From | Fixed in |
---|---|---|
apache / tomcat | 8.5.2 | 8.5.2.x |
apache / tomcat | 8.5.4 | 8.5.4.x |
apache / tomcat | 8.5.0 | 8.5.0.x |
apache / tomcat | 8.5.5 | 8.5.5.x |
apache / tomcat | 8.5.3 | 8.5.3.x |
apache / tomcat | 8.5.6 | 8.5.6.x |
apache / tomcat | 8.5.1 | 8.5.1.x |
![]() |
9.0.0.M1 | 9.0.0.M12 |
![]() |
8.5.0 | 8.5.8 |
apache / tomcat | 9.0.0-milestone1 | 9.0.0-milestone1.x |
apache / tomcat | 9.0.0-milestone10 | 9.0.0-milestone10.x |
apache / tomcat | 9.0.0-milestone11 | 9.0.0-milestone11.x |
apache / tomcat | 9.0.0-milestone2 | 9.0.0-milestone2.x |
apache / tomcat | 9.0.0-milestone3 | 9.0.0-milestone3.x |
apache / tomcat | 9.0.0-milestone4 | 9.0.0-milestone4.x |
apache / tomcat | 9.0.0-milestone5 | 9.0.0-milestone5.x |
apache / tomcat | 9.0.0-milestone6 | 9.0.0-milestone6.x |
apache / tomcat | 9.0.0-milestone7 | 9.0.0-milestone7.x |
apache / tomcat | 9.0.0-milestone8 | 9.0.0-milestone8.x |
apache / tomcat | 9.0.0-milestone9 | 9.0.0-milestone9.x |