Skip to content

Cyber security technical information

Search
Potential Risk of CVE

Security Alerts! July the 22nd the Apache Tomcat team released three security vulnerabilities.

July 24, 2018 admin

  • CVE-2018-8037: User sessions can get mixed up
  • CVE-2018-1336: Denial Of Service (DoS) via UTF-8 decoder
  • CVE-2018-8034: No host name verification in WebSocket client

https://tomcat.apache.org/security-9.html

Post navigation

Previous PostEthereum carrier Solidity shield – Call abuse vulnerability (CVE-2018-14087)Next Post23rd Jul 2018 – Bluetooth vulnerability

antihackingonline.com

Recent Posts

  • CVE-2026-6383: A flaw was found in KubeVirt’s Role-Based Access Control (RBAC) evaluation logic (20-04-2026)
  • Presumably this vulnerability (CVE-2023-20593) will only affect processors based on the Zen 2 architecture (April 17, 2026)
  • About CVE-2026-6231: MongoDB, the bson_validate function may return early on specific inputs and incorrectly report success. (16th Apr 2026)
  • CVE-2025-47389: About Qualcomm – Buffer Copy Without Checking Size of Input in Automotive Platform (15th Apr 2026)
  • CVE-2026-21381: About Qualcomm – Buffer Over-read in WLAN Firmware (14th Apr 2026)

Recent Comments

  • Google on Next Generation C&C – Google docs
  • Google on Apple enforce Meltdown and Spectre vulnerabilities remediation
  • Google on Radar revolution – from defensive evolve to attack
  • Gino on An issue was discovered in the sized-chucks crate through 0.6.2 for Rust. Software developer should be careful when make use of paypal-rs. (19-09-2020)
  • Jed on CVE-2020-15802 – Bluetooth vulnerability can cause Bluetooth devices to be attacked by man in the middle, and Bluetooth 4.0/5.0 devices are all affected! (9th Sep 2020).

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • February 2016

Categories

  • 2017
  • 2018
  • 2019
  • 2020
  • 2021
  • 2023
  • AI and ML
  • Application Development
  • Asia
  • Blockchain
  • Cell Phone (iPhone, Android, windows mobile)
  • country cyber law
  • cyber security incident news highlight
  • Cyber War
  • Data privacy
  • EU
  • Healthcare industry
  • IoT
  • Network (Protocol, Topology & Standard)
  • Potential Risk of CVE
  • Public safety
  • Ransomware
  • Science
  • System
  • Uncategorized
  • Under our observation
  • Virus & Malware
Proudly powered by WordPress