Total vulnerabilities in the database
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
Software | From | Fixed in |
---|---|---|
apache / tomcat | 10.0.0 | 10.0.6 |
apache / tomcat | 9.0.0 | 9.0.46 |
apache / tomcat | 7.0.0 | 7.0.109 |
apache / tomcat | 8.5.0 | 8.5.66 |
oracle / hospitality_cruise_shipboard_property_management_system | 20.1.0 | 20.1.0.x |
oracle / communications_diameter_signaling_router | 8.0.0 | 8.5.0.x |
oracle / communications_pricing_design_center | 12.0.0.3.0 | 12.0.0.3.0.x |
oracle / tekelec_platform_distribution | 7.4.0 | 7.7.1.x |
oracle / communications_cloud_native_core_policy | 1.14.0 | 1.14.0.x |
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |
debian / debian_linux | 11.0 | 11.0.x |
![]() |
10.0.0-M1 | 10.0.5 |
![]() |
9.0.0M1 | 9.0.45 |
![]() |
8.5.0 | 8.5.65 |