CVE-2010-1157
23.04.2010, 14:30
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apache | tomcat | 5.5.0 |
| apache | tomcat | 5.5.1 |
| apache | tomcat | 5.5.2 |
| apache | tomcat | 5.5.3 |
| apache | tomcat | 5.5.4 |
| apache | tomcat | 5.5.5 |
| apache | tomcat | 5.5.6 |
| apache | tomcat | 5.5.7 |
| apache | tomcat | 5.5.8 |
| apache | tomcat | 5.5.9 |
| apache | tomcat | 5.5.10 |
| apache | tomcat | 5.5.11 |
| apache | tomcat | 5.5.12 |
| apache | tomcat | 5.5.13 |
| apache | tomcat | 5.5.14 |
| apache | tomcat | 5.5.15 |
| apache | tomcat | 5.5.16 |
| apache | tomcat | 5.5.17 |
| apache | tomcat | 5.5.18 |
| apache | tomcat | 5.5.19 |
| apache | tomcat | 5.5.20 |
| apache | tomcat | 5.5.21 |
| apache | tomcat | 5.5.22 |
| apache | tomcat | 5.5.23 |
| apache | tomcat | 5.5.24 |
| apache | tomcat | 5.5.25 |
| apache | tomcat | 5.5.26 |
| apache | tomcat | 5.5.27 |
| apache | tomcat | 5.5.28 |
| apache | tomcat | 5.5.29 |
| apache | tomcat | 6.0.0 |
| apache | tomcat | 6.0.1 |
| apache | tomcat | 6.0.2 |
| apache | tomcat | 6.0.3 |
| apache | tomcat | 6.0.4 |
| apache | tomcat | 6.0.5 |
| apache | tomcat | 6.0.6 |
| apache | tomcat | 6.0.7 |
| apache | tomcat | 6.0.8 |
| apache | tomcat | 6.0.9 |
| apache | tomcat | 6.0.10 |
| apache | tomcat | 6.0.11 |
| apache | tomcat | 6.0.12 |
| apache | tomcat | 6.0.13 |
| apache | tomcat | 6.0.14 |
| apache | tomcat | 6.0.15 |
| apache | tomcat | 6.0.16 |
| apache | tomcat | 6.0.17 |
| apache | tomcat | 6.0.18 |
| apache | tomcat | 6.0.19 |
| apache | tomcat | 6.0.20 |
| apache | tomcat | 6.0.24 |
| apache | tomcat | 6.0.26 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References