Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-0227

EPSS 78.23% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-0227

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Tomcat 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Tomcat是美国阿帕奇(Apache)软件基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat中的java/org/apache/coyote/http11/filters/ChunkedInputFilter.java文件存在安全漏洞,该漏洞源于程序出现错误时,没有正确限制读取数据。远程攻击者可通过发送带有畸形编码块的流数据利用该漏洞实施HTTP请求走私攻击,或造成拒绝服务(资源耗尽)。以下版本受到
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-0227

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-0227

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-02-16 · 20 CVEs total

CVE-2015-1498Accelerite Persistent Systems Radia Client Automation 权限许可和访问控制漏洞
CVE-2015-1474Android ‘GraphicBuffer::unflatten’函数数字错误漏洞
CVE-2015-0609Cisco IOS Measurement, Aggregation, and Correlation Engine 竞争条件漏洞
CVE-2014-6137IBM Tivoli Endpoint Manager 跨站脚本漏洞
CVE-2014-6113IBM Tivoli Endpoint Manager Web Reports组件跨站脚本漏洞
CVE-2015-1608Topline Opportunity Form 权限许可和访问控制漏洞
CVE-2015-1613RhodeCode 信息泄露漏洞
CVE-2015-1501SolarWinds Server and Application Monitor TSUnicodeGraphEditorControl 代码注入漏洞
CVE-2015-1500SolarWinds Server and Application Monitor TSUnicodeGraphEditorControl 基于栈的缓冲区溢出漏洞
CVE-2015-1499Samsung Security Manager 权限许可和访问控制漏洞
CVE-2014-9375Lexmark Markvision Enterprise LibraryFileUploadServlet servlet 路径遍历漏洞
CVE-2015-1497Accelerite Persistent Systems Radia Client Automation 代码注入漏洞
CVE-2015-1496Motorola Mobility Scanner SDK 权限许可和访问控制漏洞
CVE-2015-1495Motorola Mobility Scanner SDK 基于栈的缓冲区溢出漏洞
CVE-2015-1436WordPress Easing Slider插件跨站脚本漏洞
CVE-2015-1435my little forum 跨站脚本漏洞
CVE-2015-1434my little forum SQL注入漏洞
CVE-2015-0268Xen 输入验证漏洞
CVE-2015-0260RhodeCode和Kallithea 信息泄露漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-0227

No comments yet


Leave a comment