This host is running Apache Tomcat and is prone to multiple vulnerabilities.
Successful exploitation will allow remote attackers to conduct session fixation attacks and manipulate certain data. Impact Level: Application
Upgrade to version 6.0.39 or 7.0.47 or 8.0.0-RC3 or later, For Updates refer to http://tomcat.apache.org
Flaws are due to the HTTP connector or AJP connector which do not properly handle certain inconsistent HTTP request headers.
Apache Tomcat version before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3
Get the installed version of Apache Tomcat with the help of detect NVT and check the version is vulnerable or not.
- Adobe Reader Information Disclosure & Code Execution Vulnerabilities (Linux)
- Apache Tomcat servlet/JSP container default files
- Apple Safari 'background' Remote Denial Of Service Vulnerability
- AOLserver Default Password