ID CVE-2007-2449
Summary Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:-:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 25-03-2019 - 11:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
oval via4
accepted 2013-04-29T04:06:50.174-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
family unix
id oval:org.mitre.oval:def:10578
status accepted
submitted 2010-07-09T03:56:16-04:00
title Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
version 18
redhat via4
advisories
  • rhsa
    id RHSA-2007:0569
  • rhsa
    id RHSA-2008:0261
  • rhsa
    id RHSA-2008:0630
rpms
  • tomcat5-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-admin-webapps-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-common-lib-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-debuginfo-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-jasper-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-jasper-javadoc-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-jsp-2.0-api-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-server-lib-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-servlet-2.4-api-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-webapps-0:5.5.23-0jpp.1.0.4.el5
  • tomcat5-0:5.5.23-0jpp_4rh.4
  • tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.4
  • tomcat5-common-lib-0:5.5.23-0jpp_4rh.4
  • tomcat5-jasper-0:5.5.23-0jpp_4rh.4
  • tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.4
  • tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.4
  • tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.4
  • tomcat5-server-lib-0:5.5.23-0jpp_4rh.4
  • tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.4
  • tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.4
  • tomcat5-webapps-0:5.5.23-0jpp_4rh.4
  • jabberd-0:2.0s10-3.38.rhn
  • java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4
  • java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el4
  • jfreechart-0:0.9.20-3.rhn
  • openmotif21-0:2.1.30-11.RHEL4.6
  • openmotif21-debuginfo-0:2.1.30-11.RHEL4.6
  • perl-Crypt-CBC-0:2.24-1.el4
  • rhn-apache-0:1.3.27-36.rhn.rhel4
  • rhn-modjk-ap13-0:1.2.23-2rhn.rhel4
  • rhn-modperl-0:1.29-16.rhel4
  • rhn-modssl-0:2.8.12-8.rhn.10.rhel4
  • tomcat5-0:5.0.30-0jpp_10rh
  • jabberd-0:2.0s10-3.37.rhn
  • jabberd-0:2.0s10-3.38.rhn
  • java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3
  • java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4
  • java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el3
  • java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el4
  • jfreechart-0:0.9.20-3.rhn
  • openmotif21-0:2.1.30-11.RHEL4.6
  • openmotif21-0:2.1.30-9.RHEL3.8
  • openmotif21-debuginfo-0:2.1.30-11.RHEL4.6
  • openmotif21-debuginfo-0:2.1.30-9.RHEL3.8
  • perl-Crypt-CBC-0:2.24-1.el3
  • perl-Crypt-CBC-0:2.24-1.el4
  • rhn-apache-0:1.3.27-36.rhn.rhel3
  • rhn-apache-0:1.3.27-36.rhn.rhel4
  • rhn-modjk-ap13-0:1.2.23-2rhn.rhel3
  • rhn-modjk-ap13-0:1.2.23-2rhn.rhel4
  • rhn-modperl-0:1.29-16.rhel3
  • rhn-modperl-0:1.29-16.rhel4
  • rhn-modssl-0:2.8.12-8.rhn.10.rhel3
  • rhn-modssl-0:2.8.12-8.rhn.10.rhel4
  • tomcat5-0:5.0.30-0jpp_10rh
  • jfreechart-0:0.9.20-3.rhn
  • mod_perl-0:2.0.2-12.el4
  • mod_perl-debuginfo-0:2.0.2-12.el4
  • perl-Crypt-CBC-0:2.24-1.el4
  • rhn-html-0:5.1.1-7
  • tomcat5-0:5.0.30-0jpp_10rh
refmap via4
apple APPLE-SA-2008-06-30
bid 24476
bugtraq
  • 20070614 [CVE-2007-2449] Apache Tomcat XSS vulnerabilities in the JSP examples
  • 20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities
  • 20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)
confirm
fedora FEDORA-2007-3456
hp
  • HPSBUX02262
  • SSRT071447
mandriva MDKSA-2007:241
mlist
  • [tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
  • [tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
  • [tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
  • [tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
  • [tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/
osvdb 36080
sectrack 1018245
secunia
  • 26076
  • 27037
  • 27727
  • 29392
  • 30802
  • 31493
  • 33668
sreason 2804
suse
  • SUSE-SR:2008:007
  • SUSE-SR:2009:004
vupen
  • ADV-2007-2213
  • ADV-2007-3386
  • ADV-2008-1981
  • ADV-2009-0233
xf tomcat-example-xss(34869)
Last major update 25-03-2019 - 11:29
Published 14-06-2007 - 23:30
Last modified 25-03-2019 - 11:29
Back to Top