cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2008-5519,https://securityvulnerability.io/vulnerability/CVE-2008-5519,,"The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.",Apache,Mod Jk,,,0.007790000177919865,false,,false,false,false,,,false,false,,2009-04-09T15:00:00.000Z,0 CVE-2007-6258,https://securityvulnerability.io/vulnerability/CVE-2007-6258,,"Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.",Apache,Mod Jk,,,0.2538599967956543,false,,false,false,false,,,false,false,,2008-02-19T00:00:00.000Z,0