CVE-2010-1157
23.04.2010, 14:30
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.Enginsight
Vendor | Product | Version |
---|---|---|
apache | tomcat | 5.5.0 |
apache | tomcat | 5.5.1 |
apache | tomcat | 5.5.2 |
apache | tomcat | 5.5.3 |
apache | tomcat | 5.5.4 |
apache | tomcat | 5.5.5 |
apache | tomcat | 5.5.6 |
apache | tomcat | 5.5.7 |
apache | tomcat | 5.5.8 |
apache | tomcat | 5.5.9 |
apache | tomcat | 5.5.10 |
apache | tomcat | 5.5.11 |
apache | tomcat | 5.5.12 |
apache | tomcat | 5.5.13 |
apache | tomcat | 5.5.14 |
apache | tomcat | 5.5.15 |
apache | tomcat | 5.5.16 |
apache | tomcat | 5.5.17 |
apache | tomcat | 5.5.18 |
apache | tomcat | 5.5.19 |
apache | tomcat | 5.5.20 |
apache | tomcat | 5.5.21 |
apache | tomcat | 5.5.22 |
apache | tomcat | 5.5.23 |
apache | tomcat | 5.5.24 |
apache | tomcat | 5.5.25 |
apache | tomcat | 5.5.26 |
apache | tomcat | 5.5.27 |
apache | tomcat | 5.5.28 |
apache | tomcat | 5.5.29 |
apache | tomcat | 6.0.0 |
apache | tomcat | 6.0.1 |
apache | tomcat | 6.0.2 |
apache | tomcat | 6.0.3 |
apache | tomcat | 6.0.4 |
apache | tomcat | 6.0.5 |
apache | tomcat | 6.0.6 |
apache | tomcat | 6.0.7 |
apache | tomcat | 6.0.8 |
apache | tomcat | 6.0.9 |
apache | tomcat | 6.0.10 |
apache | tomcat | 6.0.11 |
apache | tomcat | 6.0.12 |
apache | tomcat | 6.0.13 |
apache | tomcat | 6.0.14 |
apache | tomcat | 6.0.15 |
apache | tomcat | 6.0.16 |
apache | tomcat | 6.0.17 |
apache | tomcat | 6.0.18 |
apache | tomcat | 6.0.19 |
apache | tomcat | 6.0.20 |
apache | tomcat | 6.0.24 |
apache | tomcat | 6.0.26 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References