You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /Remediate/WebGoat5.0/tomcat/server/lib/tomcat-util.jar
Dependency Hierarchy:
❌ tomcat-util-5.5.4.jar (Vulnerable Library)
tomcat-coyote-5.5.4.jar
null
Path to vulnerable library: /Remediate/WebGoat5.0/tomcat/server/lib/tomcat-coyote.jar
Dependency Hierarchy:
❌ tomcat-coyote-5.5.4.jar (Vulnerable Library)
Vulnerability Details
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
CVE-2014-0099 - Medium Severity Vulnerability
Vulnerable Libraries - tomcat-util-5.5.4.jar, tomcat-coyote-5.5.4.jar
tomcat-util-5.5.4.jar
null
Path to vulnerable library: /Remediate/WebGoat5.0/tomcat/server/lib/tomcat-util.jar
Dependency Hierarchy:
tomcat-coyote-5.5.4.jar
null
Path to vulnerable library: /Remediate/WebGoat5.0/tomcat/server/lib/tomcat-coyote.jar
Dependency Hierarchy:
Vulnerability Details
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
Publish Date: 2014-05-31
URL: CVE-2014-0099
CVSS 2 Score Details (4.3)
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-0099
Release Date: 2014-05-31
Fix Resolution: 6.0.40,7.0.53,8.0.4
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: