This alert was generated using only banner information. It may be a false positive.
Fixed in Apache Tomcat 6.0.16:
low: Session hi-jacking CVE-2007-5333
The previous fix for CVE-2007-3385 was incomplete. It did not consider the use of quotes or %5C within a cookie value.
low: Elevated privileges CVE-2007-5342
The JULI logging component allows web applications to provide their own logging configurations. The default security policy does not restrict this configuration and allows an untrusted web application to add files or overwrite existing files where the Tomcat process has the necessary file permissions to do so.
important: Information disclosure CVE-2007-5461
When Tomcat's WebDAV servlet is configured for use with a context and has been enabled for write, some WebDAV requests that specify an entity with a SYSTEM tag can result in the contents of arbitary files being returned to the client.
important: Data integrity CVE-2007-6286
When using the native (APR based) connector, connecting to the SSL port using netcat and then disconnecting without sending any data will cause tomcat to handle a duplicate copy of one of the recent requests.
important: Information disclosure CVE-2008-0002
If an exception occurs during the processing of parameters (eg if the client disconnects) then it is possible that the parameters submitted for that request will be incorrectly processed as part of a subsequent request.
Affected Apache Tomcat version (6.0.0 - 6.0.15).
- low: Session hi-jacking CVE-2007-5333
- Upgrade Apache Tomcat to the latest version.
- WordPress Plugin WP Forum Multiple Security Vulnerbilities (1.7.8)
- WordPress Plugin NextGEN Gallery-WordPress Gallery Multiple Cross-Site Scripting Vulnerabilities (22.214.171.124)
- Joomla! Core 1.5.x Multiple SQL Injection Vulnerabilities (1.5.0 - 1.5.21)
- WordPress Plugin Subscriber by BestWebSoft Cross-Site Scripting (1.3.4)
- WordPress Plugin Theme Blvd Sliders Multiple Security Bypass Vulnerabilities (1.2.3)