

The trust level is of type confirmed by the editor, with an origin of intranet client.Īn attacker with a expert ability can exploit this computer threat announce. Our Vigilance Vulnerability Alerts team determined that the severity of this vulnerability alert is medium.
Apache tomcat 8.0 36 download software#
This weakness announce impacts software or systems such as Tomcat, Atlassian Jira Software, Debian, PowerPath, QRadar SIEM, MariaDB ~ precise, MySQL Community, MySQL Enterprise Server, openSUSE Leap, Oracle Communications, Oracle DB, Oracle Fusion Middleware, Oracle OIT, Solaris, WebLogic, Percona Server for MySQL, SUSE Linux Enterprise Desktop, SLES, Ubuntu. Impacted products: Tomcat, Atlassian Jira Software, Debian, PowerPath, QRadar SIEM, MariaDB ~ precise, MySQL Community, MySQL Enterprise Server, openSUSE Leap, Oracle Communications, Oracle DB, Oracle Fusion Middleware, Oracle OIT, Solaris, WebLogic, Percona Server for MySQL, SUSE Linux Enterprise Desktop, SLES, Ubuntu. Vulnerability of Apache Tomcat: information disclosure via H2c Request Mix-up Synthesis of the vulnerabilityĪn attacker can bypass access restrictions to data via H2c Request Mix-up of Apache Tomcat, in order to obtain sensitive information.
