Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-2902 (GCVE-0-2009-2902)
Vulnerability from cvelistv5
- n/a
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:07:37.160Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1023504",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023504"
          },
          {
            "name": "HPSBUX02541",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"
          },
          {
            "name": "HPSBMA02535",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev"
          },
          {
            "name": "39317",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39317"
          },
          {
            "name": "oval:org.mitre.oval:def:19431",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431"
          },
          {
            "name": "20100124 [SECURITY] CVE-2009-2902 Apache Tomcat unexpected file deletion in work directory",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/509150/100/0/threaded"
          },
          {
            "name": "DSA-2207",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2207"
          },
          {
            "name": "openSUSE-SU-2012:1700",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"
          },
          {
            "name": "HPSBUX02860",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
          },
          {
            "name": "40330",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40330"
          },
          {
            "name": "MDVSA-2010:177",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
          },
          {
            "name": "43310",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43310"
          },
          {
            "name": "SSRT100029",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
          },
          {
            "name": "ADV-2010-1559",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1559"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "name": "HPSBOV02762",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
          },
          {
            "name": "ADV-2010-1986",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1986"
          },
          {
            "name": "RHSA-2010:0580",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
          },
          {
            "name": "40813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40813"
          },
          {
            "name": "38541",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38541"
          },
          {
            "name": "MDVSA-2010:176",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tomcat.apache.org/security-6.html"
          },
          {
            "name": "57126",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57126"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
          },
          {
            "name": "USN-899-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-899-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "name": "SUSE-SR:2010:008",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
          },
          {
            "name": "openSUSE-SU-2013:0147",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"
          },
          {
            "name": "38687",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38687"
          },
          {
            "name": "38346",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38346"
          },
          {
            "name": "SSRT100825",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tomcat.apache.org/security-5.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
          },
          {
            "name": "37945",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37945"
          },
          {
            "name": "oval:org.mitre.oval:def:7092",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092"
          },
          {
            "name": "RHSA-2010:0119",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0119.html"
          },
          {
            "name": "RHSA-2010:0582",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
          },
          {
            "name": "SSRT101146",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
          },
          {
            "name": "38316",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38316"
          },
          {
            "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
          },
          {
            "name": "ADV-2010-0213",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0213"
          },
          {
            "name": "HPSBST02955",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
          },
          {
            "name": "SSRT100145",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev"
          },
          {
            "name": "apache-tomcat-war-directory-traversal(55857)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857"
          },
          {
            "name": "openSUSE-SU-2012:1701",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"
          },
          {
            "name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
          },
          {
            "name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
          },
          {
            "name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
          },
          {
            "name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-01-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-13T16:08:39",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "1023504",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023504"
        },
        {
          "name": "HPSBUX02541",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"
        },
        {
          "name": "HPSBMA02535",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev"
        },
        {
          "name": "39317",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39317"
        },
        {
          "name": "oval:org.mitre.oval:def:19431",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431"
        },
        {
          "name": "20100124 [SECURITY] CVE-2009-2902 Apache Tomcat unexpected file deletion in work directory",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/509150/100/0/threaded"
        },
        {
          "name": "DSA-2207",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2207"
        },
        {
          "name": "openSUSE-SU-2012:1700",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"
        },
        {
          "name": "HPSBUX02860",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
        },
        {
          "name": "40330",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40330"
        },
        {
          "name": "MDVSA-2010:177",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
        },
        {
          "name": "43310",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43310"
        },
        {
          "name": "SSRT100029",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
        },
        {
          "name": "ADV-2010-1559",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1559"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "name": "HPSBOV02762",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
        },
        {
          "name": "ADV-2010-1986",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1986"
        },
        {
          "name": "RHSA-2010:0580",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
        },
        {
          "name": "40813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40813"
        },
        {
          "name": "38541",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38541"
        },
        {
          "name": "MDVSA-2010:176",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tomcat.apache.org/security-6.html"
        },
        {
          "name": "57126",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57126"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
        },
        {
          "name": "USN-899-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-899-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "name": "SUSE-SR:2010:008",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
        },
        {
          "name": "openSUSE-SU-2013:0147",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"
        },
        {
          "name": "38687",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38687"
        },
        {
          "name": "38346",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38346"
        },
        {
          "name": "SSRT100825",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tomcat.apache.org/security-5.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
        },
        {
          "name": "37945",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37945"
        },
        {
          "name": "oval:org.mitre.oval:def:7092",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092"
        },
        {
          "name": "RHSA-2010:0119",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0119.html"
        },
        {
          "name": "RHSA-2010:0582",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
        },
        {
          "name": "SSRT101146",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
        },
        {
          "name": "38316",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38316"
        },
        {
          "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
        },
        {
          "name": "ADV-2010-0213",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0213"
        },
        {
          "name": "HPSBST02955",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
        },
        {
          "name": "SSRT100145",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev"
        },
        {
          "name": "apache-tomcat-war-directory-traversal(55857)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857"
        },
        {
          "name": "openSUSE-SU-2012:1701",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"
        },
        {
          "name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
        },
        {
          "name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
        },
        {
          "name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
        },
        {
          "name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-2902",
    "datePublished": "2010-01-28T20:00:00",
    "dateReserved": "2009-08-20T00:00:00",
    "dateUpdated": "2024-08-07T06:07:37.160Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-2902\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-01-28T20:30:01.323\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de salto de directorio en Apache Tomcat desde v5.5.0 hasta v5.5.28 y desde v6.0.0 hasta v6.0.20 permite a atacantes remotos borrar ficheros del directorio de trabajo a trav\u00e9s de secuencias de salto de directorio en un nombre de fichero WAR, como se demuestra en ..war nombre de fichero.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E98B82A-22E5-4E6C-90AE-56F5780EA147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34672E90-C220-436B-9143-480941227933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92883AFA-A02F-41A5-9977-ABEAC8AD2970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989A78F8-EE92-465F-8A8D-ECF0B58AFE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFB09F3-32D1-479C-8C39-D7329D9A6623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D56581E2-9ECD-426A-96D8-A9D958900AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717F6995-5AF0-484C-90C0-A82F25FD2E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C01D5-773F-469C-9E69-170C2844AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5CF79C-759B-4FF9-90EE-847264059E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"357651FD-392E-4775-BF20-37A23B3ABAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585B9476-6B86-4809-9B9E-26112114CB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9276A093-9C98-4617-9941-2276995F5848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5878E08E-2741-4798-94E9-BA8E07386B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F6BAB7-C099-4345-A632-7287AEA555B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3AAF031-D16B-4D51-9581-2D1376A5157B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51120689-F5C0-4DF1-91AA-314C40A46C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67477AB-85F6-421C-9C0B-C8EFB1B200CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D70CFD9-B55D-4A29-B94C-D33F3E881A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1195878-CCC9-49BC-9AC7-1F88F0DFAB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11D6FB7-CBDB-48C1-98CB-1B3CAA36C5D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E3C039-A949-4F1B-892A-57147EECB249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11951A10-39A2-4FF5-8C43-DF94730FB794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D903956B-14F5-4177-AF12-0A5F1846D3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F847DC-A2F5-456C-9038-16A0E85F4C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6B93A3A-D487-4CA1-8257-26F8FE287B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8802B2-57E0-4AA6-BC8E-00DE60468569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8461DF95-18DC-4BF5-A703-7F19DA88DC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA\"}]}]}],\"references\":[{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38316\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38346\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38541\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38687\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/39317\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/40330\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/40813\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43310\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/57126\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1023504\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT4077\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?rev=892815\u0026view=rev\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc?rev=902650\u0026view=rev\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://ubuntu.com/usn/usn-899-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:177\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0119.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0580.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0582.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/509150/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/37945\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0213\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1559\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1986\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/55857\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/38346\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38687\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/39317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/40330\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/40813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43310\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/57126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1023504\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT4077\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?rev=892815\u0026view=rev\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?rev=902650\u0026view=rev\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tomcat.apache.org/security-5.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://ubuntu.com/usn/usn-899-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0119.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0580.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0582.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/509150/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/37945\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0213\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1559\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1986\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/55857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2902\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\\n\\nThis issue has been addressed in JBoss Enterprise Web Server 1.0.1: https://rhn.redhat.com/errata/RHSA-2010-0119.html\",\"lastModified\":\"2010-03-02T00:00:00\"}]}}"
  }
}
  CERTA-2012-AVI-219
Vulnerability from certfr_avis
De multiples vulnérabilités ont étés corrigées dans HP OpenVMS. Ces vulnérabilités affectent plusieurs éléments du produit. Elles permettent de contourner des politiques de sécurité, de s'élever des privilèges, d'effectuer des modifications non autorisées, de causer des dénis de service et d'accéder à des informations non permises.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | HP Secure Web Server (SWS) pour OpenVMS utilisant CSWS_JAVA V3.1 et antérieures ; | ||
| Centreon | N/A | HP OpenVMS utilisant V7.3-2 Alpha, V8.3 Alpha/IA64, V8.3-1h1 IA64 et V8.4 Alpha/IA64. | ||
| Centreon | N/A | HP Secure Web Server (SWS) pour OpenVMS utilisant PHP V2.2 et antérieures ; | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HP Secure Web Server (SWS) pour OpenVMS utilisant CSWS_JAVA V3.1 et ant\u00e9rieures ;",
      "product": {
        "name": "Web",
        "vendor": {
          "name": "Centreon",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenVMS utilisant V7.3-2 Alpha, V8.3 Alpha/IA64, V8.3-1h1 IA64 et V8.4 Alpha/IA64.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Centreon",
          "scada": false
        }
      }
    },
    {
      "description": "HP Secure Web Server (SWS) pour OpenVMS utilisant PHP V2.2 et ant\u00e9rieures ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Centreon",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2011-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2202"
    },
    {
      "name": "CVE-2010-3870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3870"
    },
    {
      "name": "CVE-2010-4476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476"
    },
    {
      "name": "CVE-2010-4697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4697"
    },
    {
      "name": "CVE-2010-3709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3709"
    },
    {
      "name": "CVE-2011-2729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2729"
    },
    {
      "name": "CVE-2011-0421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
    },
    {
      "name": "CVE-2011-3190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3190"
    },
    {
      "name": "CVE-2010-3710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3710"
    },
    {
      "name": "CVE-2010-2100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2100"
    },
    {
      "name": "CVE-2010-2484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2484"
    },
    {
      "name": "CVE-2009-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
    },
    {
      "name": "CVE-2010-2531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2531"
    },
    {
      "name": "CVE-2009-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
    },
    {
      "name": "CVE-2009-2902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
    },
    {
      "name": "CVE-2010-4645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
    },
    {
      "name": "CVE-2012-0134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0134"
    },
    {
      "name": "CVE-2009-0580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
    },
    {
      "name": "CVE-2011-0752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0752"
    },
    {
      "name": "CVE-2009-3555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
    },
    {
      "name": "CVE-2011-1092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1092"
    },
    {
      "name": "CVE-2010-1864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1864"
    },
    {
      "name": "CVE-2011-0708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
    },
    {
      "name": "CVE-2011-1184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1184"
    },
    {
      "name": "CVE-2011-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2526"
    },
    {
      "name": "CVE-2011-1148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1148"
    },
    {
      "name": "CVE-2009-3548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
    },
    {
      "name": "CVE-2010-2191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2191"
    },
    {
      "name": "CVE-2010-2101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2101"
    },
    {
      "name": "CVE-2009-0033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
    },
    {
      "name": "CVE-2006-7243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-7243"
    },
    {
      "name": "CVE-2009-0781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
    },
    {
      "name": "CVE-2010-4698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4698"
    },
    {
      "name": "CVE-2010-2225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2225"
    },
    {
      "name": "CVE-2010-2097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2097"
    },
    {
      "name": "CVE-2011-1464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1464"
    },
    {
      "name": "CVE-2011-4885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
    },
    {
      "name": "CVE-2010-1860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1860"
    },
    {
      "name": "CVE-2010-2190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2190"
    },
    {
      "name": "CVE-2011-2204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2204"
    },
    {
      "name": "CVE-2010-1157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
    },
    {
      "name": "CVE-2010-4150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4150"
    },
    {
      "name": "CVE-2011-1938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1938"
    },
    {
      "name": "CVE-2010-1862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1862"
    }
  ],
  "initial_release_date": "2012-04-18T00:00:00",
  "last_revision_date": "2012-04-18T00:00:00",
  "links": [],
  "reference": "CERTA-2012-AVI-219",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-04-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9s corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP OpenVMS\u003c/span\u003e. Ces vuln\u00e9rabilit\u00e9s affectent plusieurs\n\u00e9l\u00e9ments du produit. Elles permettent de contourner des politiques de\ns\u00e9curit\u00e9, de s\u0027\u00e9lever des privil\u00e8ges, d\u0027effectuer des modifications non\nautoris\u00e9es, de causer des d\u00e9nis de service et d\u0027acc\u00e9der \u00e0 des\ninformations non permises.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans HP OpenVMS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 HP c03281867 du 16 avril 2012",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281867"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 HP c03281831 du 16 avril 2012",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281831"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 HP c03281869 du 16 avril 2012",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03281869"
    }
  ]
}
  CERTA-2010-AVI-041
Vulnerability from certfr_avis
De multiples vulnérabilités permettant de contourner la politique de sécurité ont été corrigées dans Apache Tomcat.
Description
De multiples vulnérabilités ont été corrigées dans Apache Tomcat. Plusieurs erreurs dans le module de déploiement permettent la modification des droits d'accès ou la suppression arbitraire de fichiers.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation). Les correctifs pour la version 5.5.x ne sont pas encore disponibles sur le site de l'éditeur.
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Apache Tomcat 5, des versions 5.5.0 \u00e0 5.5.28 ;",
      "product": {
        "name": "Tomcat",
        "vendor": {
          "name": "Apache",
          "scada": false
        }
      }
    },
    {
      "description": "Apache Tomcat 6, des versions 6.0.0 \u00e0 6.0.20.",
      "product": {
        "name": "Tomcat",
        "vendor": {
          "name": "Apache",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apache Tomcat.\nPlusieurs erreurs dans le module de d\u00e9ploiement permettent la\nmodification des droits d\u0027acc\u00e8s ou la suppression arbitraire de\nfichiers.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation). Les correctifs pour la version\n5.5.x ne sont pas encore disponibles sur le site de l\u0027\u00e9diteur.\n",
  "cves": [
    {
      "name": "CVE-2009-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
    },
    {
      "name": "CVE-2009-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
    },
    {
      "name": "CVE-2009-2902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
    },
    {
      "name": "CVE-2009-3548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
    }
  ],
  "initial_release_date": "2010-02-02T00:00:00",
  "last_revision_date": "2010-02-03T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-041",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-02-02T00:00:00.000000"
    },
    {
      "description": "pr\u00e9cision de la section Solution du document.",
      "revision_date": "2010-02-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s permettant de contourner la politique de\ns\u00e9curit\u00e9 ont \u00e9t\u00e9 corrig\u00e9es dans Apache Tomcat.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apache Tomcat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apache Tomcat 5",
      "url": "http://tomcat.apache.org/security-5.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apache Tomcat 6",
      "url": "http://tomcat.apache.org/security-6.html"
    }
  ]
}
  CERTA-2010-AVI-220
Vulnerability from certfr_avis
Plusieurs vulnérabilités découvertes dans HP Performance Manager permettent à un utilisateur distant malintentionné de provoquer un déni de service, de contourner la politique de sécurité, de porter atteinte à la confidentialité et à l'intégrité des données, d'élever ses privilèges ou encore de réaliser une attaque par injection de code indirecte.
Description
De nombreuses vulnérabilités ont été corrigées dans HP Performance Manager. Elles peuvent être exploitées par une personne malveillante afin de :
- de provoquer un déni de service (CVE-2009-0033) ;
 - de contourner la politique de sécurité (CVE-2008-5515, CVE-2009-2901) ;
 - de porter atteinte à l'intégrité des données (CVE-2009-0783, CVE-2009-2693, CVE-2009-2902) ;
 - de porter atteinte à la confidentialité des données (CVE-2009-0580, CVE-2009-0783) ;
 - d'élever ses privilèges (CVE-2009-3548) ;
 - de réaliser une attaque par injection de code indirecte (CVE-2009-0781) ;
 
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HP Performance Manager v8.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP Performance Manager v8.20 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP Performance Manager v8.21 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans HP Performance\nManager. Elles peuvent \u00eatre exploit\u00e9es par une personne malveillante\nafin de :\n\n-   de provoquer un d\u00e9ni de service (CVE-2009-0033) ;\n-   de contourner la politique de s\u00e9curit\u00e9 (CVE-2008-5515,\n    CVE-2009-2901) ;\n-   de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es (CVE-2009-0783,\n    CVE-2009-2693, CVE-2009-2902) ;\n-   de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es (CVE-2009-0580,\n    CVE-2009-0783) ;\n-   d\u0027\u00e9lever ses privil\u00e8ges (CVE-2009-3548) ;\n-   de r\u00e9aliser une attaque par injection de code indirecte\n    (CVE-2009-0781) ;\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
    },
    {
      "name": "CVE-2009-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
    },
    {
      "name": "CVE-2009-2902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
    },
    {
      "name": "CVE-2009-0580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
    },
    {
      "name": "CVE-2009-3548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
    },
    {
      "name": "CVE-2009-0033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
    },
    {
      "name": "CVE-2009-0781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
    },
    {
      "name": "CVE-2009-0783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
    },
    {
      "name": "CVE-2008-5515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
    }
  ],
  "initial_release_date": "2010-05-20T00:00:00",
  "last_revision_date": "2010-05-20T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP #c02181353 du 17 mai 2010 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02181353"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP #c02181353 du 17 mai 2010 :",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02181353"
    }
  ],
  "reference": "CERTA-2010-AVI-220",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-05-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans HP Performance Manager\npermettent \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni\nde service, de contourner la politique de s\u00e9curit\u00e9, de porter atteinte \u00e0\nla confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es, d\u0027\u00e9lever ses privil\u00e8ges\nou encore de r\u00e9aliser une attaque par injection de code indirecte.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans HP Performance Manager",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de scurit HP #c02181353 du 17 mai 2010",
      "url": null
    }
  ]
}
  CERTFR-2014-AVI-089
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans HP XP P9000 Performance Advisor Software. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
HP XP P9000 Performance Advisor Software versions 5.4.1 et antérieures
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eHP XP P9000 Performance Advisor Software versions 5.4.1 et  ant\u00e9rieures\u003c/P\u003e",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2011-5062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-5062"
    },
    {
      "name": "CVE-2011-2729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2729"
    },
    {
      "name": "CVE-2010-4172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
    },
    {
      "name": "CVE-2011-3190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3190"
    },
    {
      "name": "CVE-2011-0534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0534"
    },
    {
      "name": "CVE-2008-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
    },
    {
      "name": "CVE-2009-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
    },
    {
      "name": "CVE-2011-0013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
    },
    {
      "name": "CVE-2013-0366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0366"
    },
    {
      "name": "CVE-2013-0381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0381"
    },
    {
      "name": "CVE-2009-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
    },
    {
      "name": "CVE-2011-5063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-5063"
    },
    {
      "name": "CVE-2009-2902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
    },
    {
      "name": "CVE-2012-4431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-4431"
    },
    {
      "name": "CVE-2013-0354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0354"
    },
    {
      "name": "CVE-2007-5461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
    },
    {
      "name": "CVE-2010-2227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
    },
    {
      "name": "CVE-2008-1232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
    },
    {
      "name": "CVE-2011-1184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1184"
    },
    {
      "name": "CVE-2013-0372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0372"
    },
    {
      "name": "CVE-2011-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2526"
    },
    {
      "name": "CVE-2013-0363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0363"
    },
    {
      "name": "CVE-2009-3548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
    },
    {
      "name": "CVE-2008-2370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
    },
    {
      "name": "CVE-2013-0364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0364"
    },
    {
      "name": "CVE-2012-3546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3546"
    },
    {
      "name": "CVE-2007-5333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
    },
    {
      "name": "CVE-2012-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3219"
    },
    {
      "name": "CVE-2008-1947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
    },
    {
      "name": "CVE-2012-4534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-4534"
    },
    {
      "name": "CVE-2013-0352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0352"
    },
    {
      "name": "CVE-2013-0397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0397"
    },
    {
      "name": "CVE-2007-6286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
    },
    {
      "name": "CVE-2013-0361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0361"
    },
    {
      "name": "CVE-2011-5064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-5064"
    },
    {
      "name": "CVE-2010-3718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
    },
    {
      "name": "CVE-2007-5342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
    },
    {
      "name": "CVE-2012-3190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3190"
    },
    {
      "name": "CVE-2011-2481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2481"
    },
    {
      "name": "CVE-2011-5035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
    },
    {
      "name": "CVE-2011-2204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2204"
    },
    {
      "name": "CVE-2010-1157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
    },
    {
      "name": "CVE-2012-2733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2733"
    }
  ],
  "initial_release_date": "2014-02-25T00:00:00",
  "last_revision_date": "2014-02-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2014-AVI-089",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2014-02-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP XP P9000 Performance Advisor Software\u003c/span\u003e.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans HP XP P9000 Performance Advisor Software",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 HP c04047415 du 25 f\u00e9vrier 2014",
      "url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04047415-1"
    }
  ]
}
  CERTA-2010-AVI-284
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Tomcat sous HP-UX.
Description
Plusieurs vulnérabilités permettant l'élévation de privilèges et de porter atteinte à l'intégrité des données affectent le moteur de servlets de Tomcat sous HP-UX.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tomcat Servlet Engine 5.5.27.03 et versions ant\u00e9rieures sous HP-UX B.11.23 ;",
      "product": {
        "name": "Tomcat",
        "vendor": {
          "name": "Apache",
          "scada": false
        }
      }
    },
    {
      "description": "Tomcat Servlet Engine 5.5.27.03 et versions ant\u00e9rieures sous HP-UX B.11.11 ;",
      "product": {
        "name": "Tomcat",
        "vendor": {
          "name": "Apache",
          "scada": false
        }
      }
    },
    {
      "description": "Tomcat Servlet Engine 5.5.27.03 et versions ant\u00e9rieures sous HP-UX B.11.31.",
      "product": {
        "name": "Tomcat",
        "vendor": {
          "name": "Apache",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s permettant l\u0027\u00e9l\u00e9vation de privil\u00e8ges et de\nporter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es affectent le moteur de\nservlets de Tomcat sous HP-UX.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
    },
    {
      "name": "CVE-2009-2902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
    },
    {
      "name": "CVE-2009-3548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
    }
  ],
  "initial_release_date": "2010-06-23T00:00:00",
  "last_revision_date": "2010-06-23T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP c02241113 du 16 juin 2010 :      http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectId=c02241113",
      "url": "http://h2000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectId=c02241113"
    }
  ],
  "reference": "CERTA-2010-AVI-284",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-06-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Tomcat sous HP-UX.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Tomcat sous HP-UX",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 HP-UX HPSBUX02541 SSRT100145 du 16 juin 2010",
      "url": null
    }
  ]
}
  CERTA-2010-AVI-446
Vulnerability from certfr_avis
Plusieurs vulnérabilités dans IBM Websphere Application Server Community Edition permettent à une personne malintentionnée de porter atteinte à l'intégrité des données ou de contourner la politique de sécurité.
Description
De multiples vulnérabilités dans la version de Tomcat embarquée dans IBM Websphere Application Server Community Edition ont été découvertes :
- des fichiers peuvent être arbitrairement effacés ou altérés ;
 - le mot de passe par défaut n'est pas suffisament sûr ;
 - une installation partielle vulnérable est mise en place après l'echec du processus d'installation.
 
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
IBM Websphere Application Server Community Edition versions antérieures à la 2.1.1.4.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eIBM Websphere Application Server Community Edition versions  ant\u00e9rieures \u00e0 la 2.1.1.4.\u003c/P\u003e",
  "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s dans la version de Tomcat embarqu\u00e9e dans IBM\nWebsphere Application Server Community Edition ont \u00e9t\u00e9 d\u00e9couvertes :\n\n-   des fichiers peuvent \u00eatre arbitrairement effac\u00e9s ou alt\u00e9r\u00e9s ;\n-   le mot de passe par d\u00e9faut n\u0027est pas suffisament s\u00fbr ;\n-   une installation partielle vuln\u00e9rable est mise en place apr\u00e8s\n    l\u0027echec du processus d\u0027installation.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
    },
    {
      "name": "CVE-2009-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
    },
    {
      "name": "CVE-2009-2902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
    },
    {
      "name": "CVE-2009-3548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3548"
    }
  ],
  "initial_release_date": "2010-09-20T00:00:00",
  "last_revision_date": "2010-09-20T00:00:00",
  "links": [
    {
      "title": "Liste des changements apport\u00e9s \u00e0 IBM Websphere Application    Server Community Edition version 2.1.1.4 :",
      "url": "http://publib.boulder.ibm.com/wasce/changes/2114/CHANGES.txt"
    }
  ],
  "reference": "CERTA-2010-AVI-446",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-09-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans IBM Websphere Application Server Community\nEdition permettent \u00e0 une personne malintentionn\u00e9e de porter atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es ou de contourner la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM WebSphere Application Server Community Edition",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Liste des changements apport\u00e9s \u00e0 IBM Websphere Application Server Community Edition",
      "url": null
    }
  ]
}
  CERTA-2010-AVI-143
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Mac OS X.
Description
Plusieurs vulnérabilités ont été corrigées dans Mac OS X. Elles permettent entre autres l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Mac OS X 10.5 ;",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Mac OS X 10.6 ;",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Mac OS X Server 10.5 ;",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Mac OS X Server 10.6.",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Elles\npermettent entre autres l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-0511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0511"
    },
    {
      "name": "CVE-2010-0509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0509"
    },
    {
      "name": "CVE-2010-0501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0501"
    },
    {
      "name": "CVE-2010-0065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0065"
    },
    {
      "name": "CVE-2010-0498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0498"
    },
    {
      "name": "CVE-2010-0060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0060"
    },
    {
      "name": "CVE-2008-7247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-7247"
    },
    {
      "name": "CVE-2003-0063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2003-0063"
    },
    {
      "name": "CVE-2010-0043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0043"
    },
    {
      "name": "CVE-2010-0522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0522"
    },
    {
      "name": "CVE-2010-0063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0063"
    },
    {
      "name": "CVE-2009-3559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3559"
    },
    {
      "name": "CVE-2009-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2901"
    },
    {
      "name": "CVE-2009-4142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4142"
    },
    {
      "name": "CVE-2009-3009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3009"
    },
    {
      "name": "CVE-2010-0059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0059"
    },
    {
      "name": "CVE-2010-0524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0524"
    },
    {
      "name": "CVE-2010-0057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0057"
    },
    {
      "name": "CVE-2009-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
    },
    {
      "name": "CVE-2010-0521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0521"
    },
    {
      "name": "CVE-2008-0564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0564"
    },
    {
      "name": "CVE-2010-0518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0518"
    },
    {
      "name": "CVE-2010-0513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0513"
    },
    {
      "name": "CVE-2009-2417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
    },
    {
      "name": "CVE-2008-0888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
    },
    {
      "name": "CVE-2009-3558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3558"
    },
    {
      "name": "CVE-2009-3095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
    },
    {
      "name": "CVE-2009-2902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
    },
    {
      "name": "CVE-2010-0517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0517"
    },
    {
      "name": "CVE-2010-0535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0535"
    },
    {
      "name": "CVE-2010-0393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0393"
    },
    {
      "name": "CVE-2009-3557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3557"
    },
    {
      "name": "CVE-2009-0580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
    },
    {
      "name": "CVE-2010-0042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0042"
    },
    {
      "name": "CVE-2010-0534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0534"
    },
    {
      "name": "CVE-2010-0497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0497"
    },
    {
      "name": "CVE-2008-4456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4456"
    },
    {
      "name": "CVE-2009-4143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4143"
    },
    {
      "name": "CVE-2010-0058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0058"
    },
    {
      "name": "CVE-2010-0041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0041"
    },
    {
      "name": "CVE-2010-0508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0508"
    },
    {
      "name": "CVE-2010-0506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0506"
    },
    {
      "name": "CVE-2010-0533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0533"
    },
    {
      "name": "CVE-2010-0507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0507"
    },
    {
      "name": "CVE-2010-0504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0504"
    },
    {
      "name": "CVE-2009-0316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0316"
    },
    {
      "name": "CVE-2010-0526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0526"
    },
    {
      "name": "CVE-2010-0510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0510"
    },
    {
      "name": "CVE-2009-1904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1904"
    },
    {
      "name": "CVE-2010-0500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0500"
    },
    {
      "name": "CVE-2008-5302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
    },
    {
      "name": "CVE-2009-2042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2042"
    },
    {
      "name": "CVE-2010-0064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0064"
    },
    {
      "name": "CVE-2009-0033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
    },
    {
      "name": "CVE-2009-2446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2446"
    },
    {
      "name": "CVE-2009-2801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2801"
    },
    {
      "name": "CVE-2010-0525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0525"
    },
    {
      "name": "CVE-2010-0516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0516"
    },
    {
      "name": "CVE-2010-0502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0502"
    },
    {
      "name": "CVE-2010-0062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0062"
    },
    {
      "name": "CVE-2008-2712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-2712"
    },
    {
      "name": "CVE-2009-2906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2906"
    },
    {
      "name": "CVE-2010-0505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0505"
    },
    {
      "name": "CVE-2008-5303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
    },
    {
      "name": "CVE-2009-0781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
    },
    {
      "name": "CVE-2009-4214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4214"
    },
    {
      "name": "CVE-2009-0783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
    },
    {
      "name": "CVE-2009-0689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0689"
    },
    {
      "name": "CVE-2008-5515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
    },
    {
      "name": "CVE-2006-1329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-1329"
    },
    {
      "name": "CVE-2010-0514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0514"
    },
    {
      "name": "CVE-2009-0037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0037"
    },
    {
      "name": "CVE-2010-0515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0515"
    },
    {
      "name": "CVE-2009-2422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2422"
    },
    {
      "name": "CVE-2010-0056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0056"
    },
    {
      "name": "CVE-2010-0512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0512"
    },
    {
      "name": "CVE-2009-2632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2632"
    },
    {
      "name": "CVE-2009-0688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0688"
    },
    {
      "name": "CVE-2008-4101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4101"
    },
    {
      "name": "CVE-2010-0537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0537"
    },
    {
      "name": "CVE-2010-0519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0519"
    },
    {
      "name": "CVE-2010-0523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0523"
    },
    {
      "name": "CVE-2010-0520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0520"
    },
    {
      "name": "CVE-2010-0503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0503"
    },
    {
      "name": "CVE-2010-0055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0055"
    }
  ],
  "initial_release_date": "2010-03-30T00:00:00",
  "last_revision_date": "2010-03-30T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-143",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-03-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple MacOS X",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT4077 du 29 mars 2010",
      "url": "http://support.apple.com/kb/HT4077"
    }
  ]
}
  rhsa-2010:0693
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated tomcat5 packages that fix three security issues are now available\nfor Red Hat Certificate System 7.3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nThis erratum fixes two additional security flaws in Tomcat. In a typical\noperating environment, Tomcat is not exposed to users of Red Hat\nCertificate System in a vulnerable manner. These fixes will reduce risk in\nunique Certificate System environments. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Red Hat Certificate System 7.3 should upgrade to these updated\ntomcat5 packages, which contain backported patches to correct these issues.\nAfter installing the updated packages, the Red Hat Certificate System CA\n(rhpki-ca), DRM (rhpki-kra), OCSP (rhpki-ocsp), and TKS (rhpki-tks)\nsubsystems must be restarted (\"/etc/init.d/[instance-name] restart\") for\nthis update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0693",
        "url": "https://access.redhat.com/errata/RHSA-2010:0693"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://tomcat.apache.org/security-5.html",
        "url": "http://tomcat.apache.org/security-5.html"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "external",
        "summary": "612799",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0693.json"
      }
    ],
    "title": "Red Hat Security Advisory: tomcat5 security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:18+00:00",
      "generator": {
        "date": "2025-10-09T13:22:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0693",
      "initial_release_date": "2010-09-10T08:34:00+00:00",
      "revision_history": [
        {
          "date": "2010-09-10T08:34:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-09-10T04:37:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Certificate System 7.3 for 4AS",
                "product": {
                  "name": "Red Hat Certificate System 7.3 for 4AS",
                  "product_id": "4AS-CERT-7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:certificate_system:7.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Certificate System 7.3 for 4ES",
                "product": {
                  "name": "Red Hat Certificate System 7.3 for 4ES",
                  "product_id": "4ES-CERT-7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:certificate_system:7.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Certificate System"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.19?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2010-2227",
      "discovery_date": "2010-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "612799"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "RHBZ#612799",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
        }
      ],
      "release_date": "2010-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
    }
  ]
}
  RHSA-2010:0119
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "JBoss Enterprise Web Server 1.0.1 is now available for Red Hat Enterprise\nLinux 4 and 5.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "JBoss Enterprise Web Server is a fully integrated and certified set\nof components for hosting Java web applications. It is comprised of the\nindustry\u0027s leading web server (Apache HTTP Server), the popular Apache\nTomcat servlet container, as well as the mod_jk connector and the Tomcat\nNative library.\n\nThis 1.0.1 release of JBoss Enterprise Web Server serves as a replacement\nto JBoss Enterprise Web Server 1.0.0 GA. These updated packages include\na number of bug fixes. For detailed component, installation, and bug fix\ninformation, refer to the JBoss Enterprise Web Server 1.0.1 Release Notes,\navailable shortly from the link in the References section of this erratum.\n\nThe following security issues are also fixed with this release:\n\nA directory traversal flaw was found in the Tomcat deployment process. An\nattacker could create a specially-crafted WAR file, which once deployed\nby a local, unsuspecting user, would lead to attacker-controlled content\nbeing deployed outside of the web root, into directories accessible to the\nTomcat process. (CVE-2009-2693)\n\nA second directory traversal flaw was found in the Tomcat deployment\nprocess. WAR file names were not sanitized, which could allow an attacker\nto create a specially-crafted WAR file that could delete files in the\nTomcat host\u0027s work directory. (CVE-2009-2902)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handle session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. (CVE-2009-3555)\n\nThis update provides a mitigation for this flaw in the following\ncomponents:\n\ntomcat5 and tomcat6: A new attribute, allowUnsafeLegacyRenegotiation, is\navailable for the blocking IO (BIO) connector using JSSE, to enable or\ndisable TLS session renegotiation. The default value is \"false\", meaning\nsession renegotiation, both client- and server-initiated, is disabled by\ndefault.\n\ntomcat-native: Client-initiated renegotiation is now rejected by the native\nconnector. Server-initiated renegotiation is still allowed.\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nAll users of JBoss Enterprise Web Server 1.0.0 on Red Hat Enterprise Linux\n4 and 5 are advised to upgrade to these updated packages.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0119",
        "url": "https://access.redhat.com/errata/RHSA-2010:0119"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0.1/html-single/Release_Notes/index.html",
        "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0.1/html-single/Release_Notes/index.html"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "558872",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558872"
      },
      {
        "category": "external",
        "summary": "558873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558873"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0119.json"
      }
    ],
    "title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.1 update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:15+00:00",
      "generator": {
        "date": "2025-10-09T13:22:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0119",
      "initial_release_date": "2010-02-23T20:20:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-23T20:20:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-23T15:20:08+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
                  "product_id": "4AS-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
                  "product_id": "4ES-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
                  "product_id": "5Server-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                  "product_id": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                "product": {
                  "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                  "product_id": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-2.2_patch_01.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-0:1.2.28-4.ep5.el4.src",
                "product": {
                  "name": "mod_jk-0:1.2.28-4.ep5.el4.src",
                  "product_id": "mod_jk-0:1.2.28-4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk@1.2.28-4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                  "product_id": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-7.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                  "product_id": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                  "product_id": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                "product": {
                  "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                  "product_id": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-javaee@5.0.1-2.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                  "product_id": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3jpp.ep1.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el4.src",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el4.src",
                  "product_id": "struts12-0:1.2.9-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                  "product_id": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                "product": {
                  "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                  "product_id": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.2-1.1.ep5.el4?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.src",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.src",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.ep5.el4.src",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.ep5.el4.src",
                  "product_id": "tomcat6-0:6.0.24-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.ep5.el4.src",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.ep5.el4.src",
                  "product_id": "tomcat5-0:5.5.28-7.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                "product": {
                  "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                  "product_id": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk@1.2.28-4.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                  "product_id": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el5.src",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el5.src",
                  "product_id": "struts12-0:1.2.9-2.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                  "product_id": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                  "product_id": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                  "product_id": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                  "product_id": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.1.ep5.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                  "product_id": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.4.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                "product": {
                  "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                  "product_id": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-2.2_patch_01.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                  "product_id": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                  "product_id": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                  "product_id": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                "product": {
                  "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_id": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-javaee-poms@5.0.1-2.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                "product": {
                  "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_id": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-transaction-1.0.1-api@5.0.1-2.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                  "product_id": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3jpp.ep1.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el4.noarch",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el4.noarch",
                  "product_id": "struts12-0:1.2.9-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                  "product_id": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                "product": {
                  "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                  "product_id": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.2-1.1.ep5.el4?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                  "product_id": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el5.noarch",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el5.noarch",
                  "product_id": "struts12-0:1.2.9-2.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                  "product_id": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                  "product_id": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                "product": {
                  "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_id": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.19-2.0.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.14-4.ep5.el4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.14-1.2.1.ep5.el5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_id": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                "product": {
                  "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                  "product_id": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.19-2.0.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                  "product_id": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.14-4.ep5.el4?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.14-1.2.1.ep5.el5?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                  "product_id": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src"
        },
        "product_reference": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src"
        },
        "product_reference": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-2086",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2010-05-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "598164"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "MyFaces: XSS via state view",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2086"
        },
        {
          "category": "external",
          "summary": "RHBZ#598164",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=598164"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2086",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2086"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2086",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2086"
        }
      ],
      "release_date": "2010-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "MyFaces: XSS via state view"
    }
  ]
}
  rhsa-2010:0119
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "JBoss Enterprise Web Server 1.0.1 is now available for Red Hat Enterprise\nLinux 4 and 5.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "JBoss Enterprise Web Server is a fully integrated and certified set\nof components for hosting Java web applications. It is comprised of the\nindustry\u0027s leading web server (Apache HTTP Server), the popular Apache\nTomcat servlet container, as well as the mod_jk connector and the Tomcat\nNative library.\n\nThis 1.0.1 release of JBoss Enterprise Web Server serves as a replacement\nto JBoss Enterprise Web Server 1.0.0 GA. These updated packages include\na number of bug fixes. For detailed component, installation, and bug fix\ninformation, refer to the JBoss Enterprise Web Server 1.0.1 Release Notes,\navailable shortly from the link in the References section of this erratum.\n\nThe following security issues are also fixed with this release:\n\nA directory traversal flaw was found in the Tomcat deployment process. An\nattacker could create a specially-crafted WAR file, which once deployed\nby a local, unsuspecting user, would lead to attacker-controlled content\nbeing deployed outside of the web root, into directories accessible to the\nTomcat process. (CVE-2009-2693)\n\nA second directory traversal flaw was found in the Tomcat deployment\nprocess. WAR file names were not sanitized, which could allow an attacker\nto create a specially-crafted WAR file that could delete files in the\nTomcat host\u0027s work directory. (CVE-2009-2902)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handle session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. (CVE-2009-3555)\n\nThis update provides a mitigation for this flaw in the following\ncomponents:\n\ntomcat5 and tomcat6: A new attribute, allowUnsafeLegacyRenegotiation, is\navailable for the blocking IO (BIO) connector using JSSE, to enable or\ndisable TLS session renegotiation. The default value is \"false\", meaning\nsession renegotiation, both client- and server-initiated, is disabled by\ndefault.\n\ntomcat-native: Client-initiated renegotiation is now rejected by the native\nconnector. Server-initiated renegotiation is still allowed.\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nAll users of JBoss Enterprise Web Server 1.0.0 on Red Hat Enterprise Linux\n4 and 5 are advised to upgrade to these updated packages.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0119",
        "url": "https://access.redhat.com/errata/RHSA-2010:0119"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0.1/html-single/Release_Notes/index.html",
        "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0.1/html-single/Release_Notes/index.html"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "558872",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558872"
      },
      {
        "category": "external",
        "summary": "558873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558873"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0119.json"
      }
    ],
    "title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.1 update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:15+00:00",
      "generator": {
        "date": "2025-10-09T13:22:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0119",
      "initial_release_date": "2010-02-23T20:20:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-23T20:20:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-23T15:20:08+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
                  "product_id": "4AS-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
                  "product_id": "4ES-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
                  "product_id": "5Server-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                  "product_id": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                "product": {
                  "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                  "product_id": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-2.2_patch_01.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-0:1.2.28-4.ep5.el4.src",
                "product": {
                  "name": "mod_jk-0:1.2.28-4.ep5.el4.src",
                  "product_id": "mod_jk-0:1.2.28-4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk@1.2.28-4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                  "product_id": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-7.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                  "product_id": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                  "product_id": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                "product": {
                  "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                  "product_id": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-javaee@5.0.1-2.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                  "product_id": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3jpp.ep1.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el4.src",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el4.src",
                  "product_id": "struts12-0:1.2.9-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                  "product_id": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                "product": {
                  "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                  "product_id": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.2-1.1.ep5.el4?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.src",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.src",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.ep5.el4.src",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.ep5.el4.src",
                  "product_id": "tomcat6-0:6.0.24-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.ep5.el4.src",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.ep5.el4.src",
                  "product_id": "tomcat5-0:5.5.28-7.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                "product": {
                  "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                  "product_id": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk@1.2.28-4.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                  "product_id": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el5.src",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el5.src",
                  "product_id": "struts12-0:1.2.9-2.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                  "product_id": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                  "product_id": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                  "product_id": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                  "product_id": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.1.ep5.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                  "product_id": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.4.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                "product": {
                  "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                  "product_id": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-2.2_patch_01.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                  "product_id": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                  "product_id": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                  "product_id": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                "product": {
                  "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_id": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-javaee-poms@5.0.1-2.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                "product": {
                  "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_id": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-transaction-1.0.1-api@5.0.1-2.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                  "product_id": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3jpp.ep1.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el4.noarch",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el4.noarch",
                  "product_id": "struts12-0:1.2.9-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                  "product_id": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                "product": {
                  "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                  "product_id": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.2-1.1.ep5.el4?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                  "product_id": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el5.noarch",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el5.noarch",
                  "product_id": "struts12-0:1.2.9-2.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                  "product_id": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                  "product_id": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                "product": {
                  "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_id": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.19-2.0.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.14-4.ep5.el4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.14-1.2.1.ep5.el5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_id": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                "product": {
                  "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                  "product_id": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.19-2.0.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                  "product_id": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.14-4.ep5.el4?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.14-1.2.1.ep5.el5?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                  "product_id": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src"
        },
        "product_reference": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src"
        },
        "product_reference": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-2086",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2010-05-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "598164"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "MyFaces: XSS via state view",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2086"
        },
        {
          "category": "external",
          "summary": "RHBZ#598164",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=598164"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2086",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2086"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2086",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2086"
        }
      ],
      "release_date": "2010-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "MyFaces: XSS via state view"
    }
  ]
}
  rhsa-2010_0119
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "JBoss Enterprise Web Server 1.0.1 is now available for Red Hat Enterprise\nLinux 4 and 5.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "JBoss Enterprise Web Server is a fully integrated and certified set\nof components for hosting Java web applications. It is comprised of the\nindustry\u0027s leading web server (Apache HTTP Server), the popular Apache\nTomcat servlet container, as well as the mod_jk connector and the Tomcat\nNative library.\n\nThis 1.0.1 release of JBoss Enterprise Web Server serves as a replacement\nto JBoss Enterprise Web Server 1.0.0 GA. These updated packages include\na number of bug fixes. For detailed component, installation, and bug fix\ninformation, refer to the JBoss Enterprise Web Server 1.0.1 Release Notes,\navailable shortly from the link in the References section of this erratum.\n\nThe following security issues are also fixed with this release:\n\nA directory traversal flaw was found in the Tomcat deployment process. An\nattacker could create a specially-crafted WAR file, which once deployed\nby a local, unsuspecting user, would lead to attacker-controlled content\nbeing deployed outside of the web root, into directories accessible to the\nTomcat process. (CVE-2009-2693)\n\nA second directory traversal flaw was found in the Tomcat deployment\nprocess. WAR file names were not sanitized, which could allow an attacker\nto create a specially-crafted WAR file that could delete files in the\nTomcat host\u0027s work directory. (CVE-2009-2902)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handle session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. (CVE-2009-3555)\n\nThis update provides a mitigation for this flaw in the following\ncomponents:\n\ntomcat5 and tomcat6: A new attribute, allowUnsafeLegacyRenegotiation, is\navailable for the blocking IO (BIO) connector using JSSE, to enable or\ndisable TLS session renegotiation. The default value is \"false\", meaning\nsession renegotiation, both client- and server-initiated, is disabled by\ndefault.\n\ntomcat-native: Client-initiated renegotiation is now rejected by the native\nconnector. Server-initiated renegotiation is still allowed.\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nAll users of JBoss Enterprise Web Server 1.0.0 on Red Hat Enterprise Linux\n4 and 5 are advised to upgrade to these updated packages.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0119",
        "url": "https://access.redhat.com/errata/RHSA-2010:0119"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0.1/html-single/Release_Notes/index.html",
        "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0.1/html-single/Release_Notes/index.html"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "558872",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558872"
      },
      {
        "category": "external",
        "summary": "558873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558873"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0119.json"
      }
    ],
    "title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.1 update",
    "tracking": {
      "current_release_date": "2024-11-22T03:34:15+00:00",
      "generator": {
        "date": "2024-11-22T03:34:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0119",
      "initial_release_date": "2010-02-23T20:20:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-23T20:20:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-23T15:20:08+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:34:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
                  "product_id": "4AS-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
                  "product_id": "4ES-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
                  "product_id": "5Server-JBEWS-5.0.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                  "product_id": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                "product": {
                  "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                  "product_id": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-2.2_patch_01.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-0:1.2.28-4.ep5.el4.src",
                "product": {
                  "name": "mod_jk-0:1.2.28-4.ep5.el4.src",
                  "product_id": "mod_jk-0:1.2.28-4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk@1.2.28-4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                  "product_id": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-7.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                  "product_id": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                  "product_id": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                "product": {
                  "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                  "product_id": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-javaee@5.0.1-2.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                  "product_id": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3jpp.ep1.3.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el4.src",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el4.src",
                  "product_id": "struts12-0:1.2.9-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                  "product_id": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                "product": {
                  "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                  "product_id": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.2-1.1.ep5.el4?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.src",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.src",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.ep5.el4.src",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.ep5.el4.src",
                  "product_id": "tomcat6-0:6.0.24-2.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.ep5.el4.src",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.ep5.el4.src",
                  "product_id": "tomcat5-0:5.5.28-7.ep5.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.ep5.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                "product": {
                  "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                  "product_id": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk@1.2.28-4.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                  "product_id": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el5.src",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el5.src",
                  "product_id": "struts12-0:1.2.9-2.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                  "product_id": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                  "product_id": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                  "product_id": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.1.ep5.el5?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                  "product_id": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.1.ep5.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                  "product_id": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-validator@1.3.1-7.4.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                "product": {
                  "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                  "product_id": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xerces-j2@2.9.1-2.2_patch_01.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                  "product_id": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-digester@1.8.1-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                  "product_id": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                  "product_id": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                "product": {
                  "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_id": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-javaee-poms@5.0.1-2.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                "product": {
                  "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_id": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jboss-transaction-1.0.1-api@5.0.1-2.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                  "product_id": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3jpp.ep1.3.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el4.noarch",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el4.noarch",
                  "product_id": "struts12-0:1.2.9-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                  "product_id": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                "product": {
                  "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                  "product_id": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons-resolver12@1.2-1.1.ep5.el4?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-2.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-7.ep5.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                  "product_id": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-chain@1.2-2.1.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                  "product_id": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-oro@2.0.8-3.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "struts12-0:1.2.9-2.ep5.el5.noarch",
                "product": {
                  "name": "struts12-0:1.2.9-2.ep5.el5.noarch",
                  "product_id": "struts12-0:1.2.9-2.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/struts12@1.2.9-2.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                "product": {
                  "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                  "product_id": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-3.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                "product": {
                  "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                  "product_id": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-io@1.4-1.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-2.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-7.1.ep5.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                  "product_id": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.28-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                "product": {
                  "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_id": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.19-2.0.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.14-4.ep5.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                  "product_id": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.14-4.ep5.el4?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.14-1.2.1.ep5.el5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_id": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.14-1.2.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_id": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.1.ep5.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                "product": {
                  "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                  "product_id": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-debuginfo@1.2.28-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                "product": {
                  "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                  "product_id": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.1.19-2.0.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                  "product_id": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_id": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.14-4.ep5.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                "product": {
                  "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                  "product_id": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.14-4.ep5.el4?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.14-1.2.1.ep5.el5?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_id": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.14-1.2.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                "product": {
                  "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                  "product_id": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-ap20@1.2.28-4.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                "product": {
                  "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                  "product_id": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_jk-manual@1.2.28-4.1.ep5.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                "product": {
                  "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                  "product_id": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat-native@1.1.19-2.0.1.ep5.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src"
        },
        "product_reference": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
          "product_id": "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
        "relates_to_product_reference": "4AS-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src"
        },
        "product_reference": "jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src"
        },
        "product_reference": "jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch"
        },
        "product_reference": "jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64"
        },
        "product_reference": "tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src"
        },
        "product_reference": "xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
          "product_id": "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src"
        },
        "product_reference": "xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
        "relates_to_product_reference": "4ES-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glassfish-jsf-0:1.2_13-3.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src"
        },
        "product_reference": "glassfish-jsf-0:1.2_13-3.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src"
        },
        "product_reference": "jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src"
        },
        "product_reference": "jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src"
        },
        "product_reference": "jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-0:1.2.28-4.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src"
        },
        "product_reference": "mod_jk-0:1.2.28-4.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386"
        },
        "product_reference": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "struts12-0:1.2.9-2.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src"
        },
        "product_reference": "struts12-0:1.2.9-2.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64"
        },
        "product_reference": "tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.28-7.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src"
        },
        "product_reference": "tomcat5-0:5.5.28-7.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.24-2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src"
        },
        "product_reference": "tomcat6-0:6.0.24-2.1.ep5.el5.src",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
          "product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch",
        "relates_to_product_reference": "5Server-JBEWS-5.0.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-2086",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2010-05-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "598164"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "MyFaces: XSS via state view",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
          "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
          "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
          "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
          "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
          "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
          "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2086"
        },
        {
          "category": "external",
          "summary": "RHBZ#598164",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=598164"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2086",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2086"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2086",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2086"
        }
      ],
      "release_date": "2010-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-23T20:20:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0119"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4AS-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4AS-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4AS-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:httpd22-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:httpd22-manual-0:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-digester-0:1.8.1-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-modeler-0:2.0-3.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-commons-validator-0:1.3.1-7.4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3jpp.ep1.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-0:5.0.1-2.3.ep5.el4.src",
            "4ES-JBEWS-5.0.0:jboss-javaee-poms-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:jboss-transaction-1.0.1-api-0:5.0.1-2.3.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:mod_jk-0:1.2.28-4.ep5.el4.src",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-debuginfo-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.14-4.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.i386",
            "4ES-JBEWS-5.0.0:tomcat-native-debuginfo-0:1.1.19-2.0.ep5.el4.x86_64",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-7.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-2.ep5.el4.src",
            "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xerces-j2-0:2.9.1-2.2_patch_01.ep5.el4.src",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.noarch",
            "4ES-JBEWS-5.0.0:xml-commons-resolver12-1:1.2-1.1.ep5.el4.src",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:glassfish-jsf-0:1.2_13-3.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:httpd-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-chain-0:1.2-2.1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-commons-io-0:1.4-1.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:jakarta-oro-0:2.0.8-3.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-0:1.2.28-4.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-ap20-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_jk-manual-0:1.2.28-4.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.14-1.2.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:struts12-0:1.2.9-2.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.i386",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat-native-0:1.1.19-2.0.1.ep5.el5.x86_64",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-7.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-7.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-2.1.ep5.el5.src",
            "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-2.1.ep5.el5.noarch",
            "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-2.1.ep5.el5.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "MyFaces: XSS via state view"
    }
  ]
}
  RHSA-2010:0693
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated tomcat5 packages that fix three security issues are now available\nfor Red Hat Certificate System 7.3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nThis erratum fixes two additional security flaws in Tomcat. In a typical\noperating environment, Tomcat is not exposed to users of Red Hat\nCertificate System in a vulnerable manner. These fixes will reduce risk in\nunique Certificate System environments. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Red Hat Certificate System 7.3 should upgrade to these updated\ntomcat5 packages, which contain backported patches to correct these issues.\nAfter installing the updated packages, the Red Hat Certificate System CA\n(rhpki-ca), DRM (rhpki-kra), OCSP (rhpki-ocsp), and TKS (rhpki-tks)\nsubsystems must be restarted (\"/etc/init.d/[instance-name] restart\") for\nthis update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0693",
        "url": "https://access.redhat.com/errata/RHSA-2010:0693"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://tomcat.apache.org/security-5.html",
        "url": "http://tomcat.apache.org/security-5.html"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "external",
        "summary": "612799",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0693.json"
      }
    ],
    "title": "Red Hat Security Advisory: tomcat5 security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:18+00:00",
      "generator": {
        "date": "2025-10-09T13:22:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0693",
      "initial_release_date": "2010-09-10T08:34:00+00:00",
      "revision_history": [
        {
          "date": "2010-09-10T08:34:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-09-10T04:37:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Certificate System 7.3 for 4AS",
                "product": {
                  "name": "Red Hat Certificate System 7.3 for 4AS",
                  "product_id": "4AS-CERT-7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:certificate_system:7.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Certificate System 7.3 for 4ES",
                "product": {
                  "name": "Red Hat Certificate System 7.3 for 4ES",
                  "product_id": "4ES-CERT-7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:certificate_system:7.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Certificate System"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.19?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2010-2227",
      "discovery_date": "2010-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "612799"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "RHBZ#612799",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
        }
      ],
      "release_date": "2010-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
    }
  ]
}
  rhsa-2010:0580
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated tomcat5 packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nThe Tomcat security update RHSA-2009:1164 did not, unlike the erratum text\nstated, provide a fix for CVE-2009-0781, a cross-site scripting (XSS) flaw\nin the examples calendar application. With some web browsers, remote\nattackers could use this flaw to inject arbitrary web script or HTML via\nthe \"time\" parameter. (CVE-2009-2696)\n\nTwo directory traversal flaws were found in the Tomcat deployment process.\nA specially-crafted WAR file could, when deployed, cause a file to be\ncreated outside of the web root into any directory writable by the Tomcat\nuser, or could lead to the deletion of files in the Tomcat host\u0027s work\ndirectory. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0580",
        "url": "https://access.redhat.com/errata/RHSA-2010:0580"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "external",
        "summary": "612799",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
      },
      {
        "category": "external",
        "summary": "616717",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=616717"
      },
      {
        "category": "external",
        "summary": "http://tomcat.apache.org/security-5.html",
        "url": "http://tomcat.apache.org/security-5.html"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0580.json"
      }
    ],
    "title": "Red Hat Security Advisory: tomcat5 security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:16+00:00",
      "generator": {
        "date": "2025-10-09T13:22:16+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0580",
      "initial_release_date": "2010-08-02T20:00:00+00:00",
      "revision_history": [
        {
          "date": "2010-08-02T20:00:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-08-02T16:00:06+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:16+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                  "product_id": "5Client-Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
                  "product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
                  "product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
                "product": {
                  "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
                  "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.9.el5_5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:00:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0580"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2696",
      "discovery_date": "2009-08-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "616717"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to \"invalid HTML.\" NOTE: this is due to a missing fix for CVE-2009-0781.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: missing fix for CVE-2009-0781",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2696"
        },
        {
          "category": "external",
          "summary": "RHBZ#616717",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=616717"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2696",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2696"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2696",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2696"
        }
      ],
      "release_date": "2010-08-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:00:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0580"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: missing fix for CVE-2009-0781"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:00:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0580"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2010-2227",
      "discovery_date": "2010-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "612799"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
          "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
          "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "RHBZ#612799",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
        }
      ],
      "release_date": "2010-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:00:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0580"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client-Workstation:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Client:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Client:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.src",
            "5Server:tomcat5-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-common-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.ppc64",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-server-lib-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.9.el5_5.x86_64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.i386",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ia64",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.ppc",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.s390x",
            "5Server:tomcat5-webapps-0:5.5.23-0jpp.9.el5_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
    }
  ]
}
  RHSA-2010:0582
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated tomcat5 packages that fix three security issues are now available\nfor Red Hat Application Server v2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nTwo directory traversal flaws were found in the Tomcat deployment process.\nA specially-crafted WAR file could, when deployed, cause a file to be\ncreated outside of the web root into any directory writable by the Tomcat\nuser, or could lead to the deletion of files in the Tomcat host\u0027s work\ndirectory. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0582",
        "url": "https://access.redhat.com/errata/RHSA-2010:0582"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://tomcat.apache.org/security-5.html",
        "url": "http://tomcat.apache.org/security-5.html"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "external",
        "summary": "612799",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0582.json"
      }
    ],
    "title": "Red Hat Security Advisory: tomcat5 security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:17+00:00",
      "generator": {
        "date": "2025-10-09T13:22:17+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0582",
      "initial_release_date": "2010-08-02T20:17:00+00:00",
      "revision_history": [
        {
          "date": "2010-08-02T20:17:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-08-02T16:17:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:17+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4AS",
                "product": {
                  "name": "Red Hat Application Server v2 4AS",
                  "product_id": "4AS-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4ES",
                "product": {
                  "name": "Red Hat Application Server v2 4ES",
                  "product_id": "4ES-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4WS",
                "product": {
                  "name": "Red Hat Application Server v2 4WS",
                  "product_id": "4WS-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Application Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.17?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2010-2227",
      "discovery_date": "2010-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "612799"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "RHBZ#612799",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
        }
      ],
      "release_date": "2010-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
    }
  ]
}
  rhsa-2010_0582
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated tomcat5 packages that fix three security issues are now available\nfor Red Hat Application Server v2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nTwo directory traversal flaws were found in the Tomcat deployment process.\nA specially-crafted WAR file could, when deployed, cause a file to be\ncreated outside of the web root into any directory writable by the Tomcat\nuser, or could lead to the deletion of files in the Tomcat host\u0027s work\ndirectory. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0582",
        "url": "https://access.redhat.com/errata/RHSA-2010:0582"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://tomcat.apache.org/security-5.html",
        "url": "http://tomcat.apache.org/security-5.html"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "external",
        "summary": "612799",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0582.json"
      }
    ],
    "title": "Red Hat Security Advisory: tomcat5 security update",
    "tracking": {
      "current_release_date": "2024-11-22T03:34:28+00:00",
      "generator": {
        "date": "2024-11-22T03:34:28+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0582",
      "initial_release_date": "2010-08-02T20:17:00+00:00",
      "revision_history": [
        {
          "date": "2010-08-02T20:17:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-08-02T16:17:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:34:28+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4AS",
                "product": {
                  "name": "Red Hat Application Server v2 4AS",
                  "product_id": "4AS-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4ES",
                "product": {
                  "name": "Red Hat Application Server v2 4ES",
                  "product_id": "4ES-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4WS",
                "product": {
                  "name": "Red Hat Application Server v2 4WS",
                  "product_id": "4WS-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Application Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.17?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2010-2227",
      "discovery_date": "2010-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "612799"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "RHBZ#612799",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
        }
      ],
      "release_date": "2010-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
    }
  ]
}
  rhsa-2010:0582
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated tomcat5 packages that fix three security issues are now available\nfor Red Hat Application Server v2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nTwo directory traversal flaws were found in the Tomcat deployment process.\nA specially-crafted WAR file could, when deployed, cause a file to be\ncreated outside of the web root into any directory writable by the Tomcat\nuser, or could lead to the deletion of files in the Tomcat host\u0027s work\ndirectory. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Tomcat must be restarted for\nthis update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0582",
        "url": "https://access.redhat.com/errata/RHSA-2010:0582"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://tomcat.apache.org/security-5.html",
        "url": "http://tomcat.apache.org/security-5.html"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "external",
        "summary": "612799",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0582.json"
      }
    ],
    "title": "Red Hat Security Advisory: tomcat5 security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:22:17+00:00",
      "generator": {
        "date": "2025-10-09T13:22:17+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0582",
      "initial_release_date": "2010-08-02T20:17:00+00:00",
      "revision_history": [
        {
          "date": "2010-08-02T20:17:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-08-02T16:17:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:22:17+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4AS",
                "product": {
                  "name": "Red Hat Application Server v2 4AS",
                  "product_id": "4AS-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4ES",
                "product": {
                  "name": "Red Hat Application Server v2 4ES",
                  "product_id": "4ES-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Application Server v2 4WS",
                "product": {
                  "name": "Red Hat Application Server v2 4WS",
                  "product_id": "4WS-RHAPS2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_application_server:2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Application Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                "product": {
                  "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp_4rh.17?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.17?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4AS",
          "product_id": "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4AS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4ES",
          "product_id": "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4ES-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.17.src as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.17.src",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch as a component of Red Hat Application Server v2 4WS",
          "product_id": "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        },
        "product_reference": "tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
        "relates_to_product_reference": "4WS-RHAPS2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2010-2227",
      "discovery_date": "2010-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "612799"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
          "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
          "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "RHBZ#612799",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
        }
      ],
      "release_date": "2010-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-02T20:17:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0582"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4AS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4AS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4ES-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4ES-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-0:5.5.23-0jpp_4rh.17.src",
            "4WS-RHAPS2:tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-common-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-server-lib-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.17.noarch",
            "4WS-RHAPS2:tomcat5-webapps-0:5.5.23-0jpp_4rh.17.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
    }
  ]
}
  rhsa-2010_0693
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated tomcat5 packages that fix three security issues are now available\nfor Red Hat Certificate System 7.3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA flaw was found in the way Tomcat handled the Transfer-Encoding header in\nHTTP requests. A specially-crafted HTTP request could prevent Tomcat from\nsending replies, or cause Tomcat to return truncated replies, or replies\ncontaining data related to the requests of other users, for all subsequent\nHTTP requests. (CVE-2010-2227)\n\nThis erratum fixes two additional security flaws in Tomcat. In a typical\noperating environment, Tomcat is not exposed to users of Red Hat\nCertificate System in a vulnerable manner. These fixes will reduce risk in\nunique Certificate System environments. (CVE-2009-2693, CVE-2009-2902)\n\nUsers of Red Hat Certificate System 7.3 should upgrade to these updated\ntomcat5 packages, which contain backported patches to correct these issues.\nAfter installing the updated packages, the Red Hat Certificate System CA\n(rhpki-ca), DRM (rhpki-kra), OCSP (rhpki-ocsp), and TKS (rhpki-tks)\nsubsystems must be restarted (\"/etc/init.d/[instance-name] restart\") for\nthis update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0693",
        "url": "https://access.redhat.com/errata/RHSA-2010:0693"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://tomcat.apache.org/security-5.html",
        "url": "http://tomcat.apache.org/security-5.html"
      },
      {
        "category": "external",
        "summary": "559738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
      },
      {
        "category": "external",
        "summary": "559761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
      },
      {
        "category": "external",
        "summary": "612799",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0693.json"
      }
    ],
    "title": "Red Hat Security Advisory: tomcat5 security update",
    "tracking": {
      "current_release_date": "2024-11-22T03:34:39+00:00",
      "generator": {
        "date": "2024-11-22T03:34:39+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0693",
      "initial_release_date": "2010-09-10T08:34:00+00:00",
      "revision_history": [
        {
          "date": "2010-09-10T08:34:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-09-10T04:37:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:34:39+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Certificate System 7.3 for 4AS",
                "product": {
                  "name": "Red Hat Certificate System 7.3 for 4AS",
                  "product_id": "4AS-CERT-7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:certificate_system:7.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Certificate System 7.3 for 4ES",
                "product": {
                  "name": "Red Hat Certificate System 7.3 for 4ES",
                  "product_id": "4ES-CERT-7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:certificate_system:7.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Certificate System"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.19?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.19?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.19.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.19.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-2693",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion and/or alteration",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "RHBZ#559738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2693"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion and/or alteration"
    },
    {
      "cve": "CVE-2009-2902",
      "discovery_date": "2010-01-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "559761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: unexpected file deletion in work directory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "RHBZ#559761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2902",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2902"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
        }
      ],
      "release_date": "2010-01-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: unexpected file deletion in work directory"
    },
    {
      "cve": "CVE-2010-2227",
      "discovery_date": "2010-07-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "612799"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with \"recycling of a buffer.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "RHBZ#612799",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=612799"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2227",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2227"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2227"
        }
      ],
      "release_date": "2010-07-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-09-10T08:34:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0693"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.19.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.19.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.19.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: information leak vulnerability in the handling of \u0027Transfer-Encoding\u0027 header"
    }
  ]
}
  gsd-2009-2902
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2009-2902",
    "description": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
    "id": "GSD-2009-2902",
    "references": [
      "https://www.suse.com/security/cve/CVE-2009-2902.html",
      "https://www.debian.org/security/2011/dsa-2207",
      "https://access.redhat.com/errata/RHSA-2010:0693",
      "https://access.redhat.com/errata/RHSA-2010:0582",
      "https://access.redhat.com/errata/RHSA-2010:0580",
      "https://access.redhat.com/errata/RHSA-2010:0119",
      "https://linux.oracle.com/cve/CVE-2009-2902.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2009-2902"
      ],
      "details": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
      "id": "GSD-2009-2902",
      "modified": "2023-12-13T01:19:46.782774Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2009-2902",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
            "refsource": "MISC",
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "name": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
          },
          {
            "name": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
          },
          {
            "name": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
          },
          {
            "name": "http://support.apple.com/kb/HT4077",
            "refsource": "MISC",
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "name": "http://tomcat.apache.org/security-5.html",
            "refsource": "MISC",
            "url": "http://tomcat.apache.org/security-5.html"
          },
          {
            "name": "http://tomcat.apache.org/security-6.html",
            "refsource": "MISC",
            "url": "http://tomcat.apache.org/security-6.html"
          },
          {
            "name": "http://www.debian.org/security/2011/dsa-2207",
            "refsource": "MISC",
            "url": "http://www.debian.org/security/2011/dsa-2207"
          },
          {
            "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176",
            "refsource": "MISC",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
          },
          {
            "name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E",
            "refsource": "MISC",
            "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
          },
          {
            "name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E",
            "refsource": "MISC",
            "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
          },
          {
            "name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E",
            "refsource": "MISC",
            "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
          },
          {
            "name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E",
            "refsource": "MISC",
            "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
          },
          {
            "name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
          },
          {
            "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
            "refsource": "MISC",
            "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
          },
          {
            "name": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
          },
          {
            "name": "http://secunia.com/advisories/57126",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/57126"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
          },
          {
            "name": "http://secunia.com/advisories/39317",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/39317"
          },
          {
            "name": "http://secunia.com/advisories/38316",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/38316"
          },
          {
            "name": "http://secunia.com/advisories/38346",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/38346"
          },
          {
            "name": "http://secunia.com/advisories/38541",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/38541"
          },
          {
            "name": "http://secunia.com/advisories/43310",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/43310"
          },
          {
            "name": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev",
            "refsource": "MISC",
            "url": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev"
          },
          {
            "name": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev",
            "refsource": "MISC",
            "url": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev"
          },
          {
            "name": "http://ubuntu.com/usn/usn-899-1",
            "refsource": "MISC",
            "url": "http://ubuntu.com/usn/usn-899-1"
          },
          {
            "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177",
            "refsource": "MISC",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
          },
          {
            "name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
            "refsource": "MISC",
            "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2010/0213",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2010/0213"
          },
          {
            "name": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113",
            "refsource": "MISC",
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"
          },
          {
            "name": "http://secunia.com/advisories/38687",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/38687"
          },
          {
            "name": "http://secunia.com/advisories/40330",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/40330"
          },
          {
            "name": "http://secunia.com/advisories/40813",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/40813"
          },
          {
            "name": "http://securitytracker.com/id?1023504",
            "refsource": "MISC",
            "url": "http://securitytracker.com/id?1023504"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2010-0119.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0119.html"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2010-0580.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2010-0582.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
          },
          {
            "name": "http://www.securityfocus.com/archive/1/509150/100/0/threaded",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/archive/1/509150/100/0/threaded"
          },
          {
            "name": "http://www.securityfocus.com/bid/37945",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/bid/37945"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2010/1559",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2010/1559"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2010/1986",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2010/1986"
          },
          {
            "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857",
            "refsource": "MISC",
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092"
          }
        ]
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "[5.5.0,5.5.28],[6.0.0,6.0.20]",
          "affected_versions": "All versions starting from 5.5.0 up to 5.5.28, all versions starting from 6.0.0 up to 6.0.20",
          "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "cwe_ids": [
            "CWE-1035",
            "CWE-22",
            "CWE-937"
          ],
          "date": "2022-06-17",
          "description": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
          "fixed_versions": [
            "5.5.29",
            "6.0.24"
          ],
          "identifier": "CVE-2009-2902",
          "identifiers": [
            "GHSA-8wch-9gcg-v2pr",
            "CVE-2009-2902"
          ],
          "not_impacted": "All versions before 5.5.0, all versions after 5.5.28 before 6.0.0, all versions after 6.0.20",
          "package_slug": "maven/org.apache.tomcat/tomcat",
          "pubdate": "2022-05-02",
          "solution": "Upgrade to versions 5.5.29, 6.0.24 or above.",
          "title": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "urls": [
            "https://nvd.nist.gov/vuln/detail/CVE-2009-2902",
            "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857",
            "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E",
            "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E",
            "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E",
            "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E",
            "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431",
            "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html",
            "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html",
            "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html",
            "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html",
            "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2",
            "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2",
            "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2",
            "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2",
            "http://support.apple.com/kb/HT4077",
            "http://svn.apache.org/viewvc?rev=892815\u0026view=rev",
            "http://svn.apache.org/viewvc?rev=902650\u0026view=rev",
            "http://tomcat.apache.org/security-5.html",
            "http://tomcat.apache.org/security-6.html",
            "http://ubuntu.com/usn/usn-899-1",
            "http://www.debian.org/security/2011/dsa-2207",
            "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
            "https://github.com/advisories/GHSA-8wch-9gcg-v2pr"
          ],
          "uuid": "554f7944-2030-48c1-899b-1b67260083f5"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2009-2902"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-22"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "38316",
              "refsource": "SECUNIA",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "http://secunia.com/advisories/38316"
            },
            {
              "name": "1023504",
              "refsource": "SECTRACK",
              "tags": [],
              "url": "http://securitytracker.com/id?1023504"
            },
            {
              "name": "37945",
              "refsource": "BID",
              "tags": [],
              "url": "http://www.securityfocus.com/bid/37945"
            },
            {
              "name": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev"
            },
            {
              "name": "ADV-2010-0213",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/0213"
            },
            {
              "name": "http://tomcat.apache.org/security-5.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://tomcat.apache.org/security-5.html"
            },
            {
              "name": "38346",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/38346"
            },
            {
              "name": "http://tomcat.apache.org/security-6.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://tomcat.apache.org/security-6.html"
            },
            {
              "name": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev"
            },
            {
              "name": "38541",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/38541"
            },
            {
              "name": "USN-899-1",
              "refsource": "UBUNTU",
              "tags": [],
              "url": "http://ubuntu.com/usn/usn-899-1"
            },
            {
              "name": "38687",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/38687"
            },
            {
              "name": "RHSA-2010:0119",
              "refsource": "REDHAT",
              "tags": [],
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0119.html"
            },
            {
              "name": "APPLE-SA-2010-03-29-1",
              "refsource": "APPLE",
              "tags": [],
              "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
            },
            {
              "name": "http://support.apple.com/kb/HT4077",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://support.apple.com/kb/HT4077"
            },
            {
              "name": "SUSE-SR:2010:008",
              "refsource": "SUSE",
              "tags": [],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
            },
            {
              "name": "39317",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/39317"
            },
            {
              "name": "HPSBUX02541",
              "refsource": "HP",
              "tags": [],
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"
            },
            {
              "name": "40330",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/40330"
            },
            {
              "name": "ADV-2010-1559",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/1559"
            },
            {
              "name": "RHSA-2010:0580",
              "refsource": "REDHAT",
              "tags": [],
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
            },
            {
              "name": "40813",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/40813"
            },
            {
              "name": "RHSA-2010:0582",
              "refsource": "REDHAT",
              "tags": [],
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
            },
            {
              "name": "ADV-2010-1986",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/1986"
            },
            {
              "name": "MDVSA-2010:177",
              "refsource": "MANDRIVA",
              "tags": [],
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
            },
            {
              "name": "MDVSA-2010:176",
              "refsource": "MANDRIVA",
              "tags": [],
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
            },
            {
              "name": "43310",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/43310"
            },
            {
              "name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
            },
            {
              "name": "DSA-2207",
              "refsource": "DEBIAN",
              "tags": [],
              "url": "http://www.debian.org/security/2011/dsa-2207"
            },
            {
              "name": "openSUSE-SU-2012:1700",
              "refsource": "SUSE",
              "tags": [],
              "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"
            },
            {
              "name": "openSUSE-SU-2012:1701",
              "refsource": "SUSE",
              "tags": [],
              "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"
            },
            {
              "name": "openSUSE-SU-2013:0147",
              "refsource": "SUSE",
              "tags": [],
              "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"
            },
            {
              "name": "HPSBUX02860",
              "refsource": "HP",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
            },
            {
              "name": "HPSBST02955",
              "refsource": "HP",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
            },
            {
              "name": "57126",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/57126"
            },
            {
              "name": "HPSBOV02762",
              "refsource": "HP",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
            },
            {
              "name": "HPSBMA02535",
              "refsource": "HP",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
            },
            {
              "name": "apache-tomcat-war-directory-traversal(55857)",
              "refsource": "XF",
              "tags": [],
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857"
            },
            {
              "name": "oval:org.mitre.oval:def:7092",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092"
            },
            {
              "name": "oval:org.mitre.oval:def:19431",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431"
            },
            {
              "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
            },
            {
              "name": "20100124 [SECURITY] CVE-2009-2902 Apache Tomcat unexpected file deletion in work directory",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/509150/100/0/threaded"
            },
            {
              "name": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E",
              "refsource": "MISC",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
            },
            {
              "name": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E",
              "refsource": "MISC",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
            },
            {
              "name": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E",
              "refsource": "MISC",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
            },
            {
              "name": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E",
              "refsource": "MISC",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "exploitabilityScore": 8.6,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": true
        }
      },
      "lastModifiedDate": "2023-02-13T01:17Z",
      "publishedDate": "2010-01-28T20:30Z"
    }
  }
}
  fkie_cve-2009-2902
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113 | ||
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=127420533226623&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=133469267822771&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=136485229118404&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=139344343412337&w=2 | ||
| secalert@redhat.com | http://secunia.com/advisories/38316 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/38346 | ||
| secalert@redhat.com | http://secunia.com/advisories/38541 | ||
| secalert@redhat.com | http://secunia.com/advisories/38687 | ||
| secalert@redhat.com | http://secunia.com/advisories/39317 | ||
| secalert@redhat.com | http://secunia.com/advisories/40330 | ||
| secalert@redhat.com | http://secunia.com/advisories/40813 | ||
| secalert@redhat.com | http://secunia.com/advisories/43310 | ||
| secalert@redhat.com | http://secunia.com/advisories/57126 | ||
| secalert@redhat.com | http://securitytracker.com/id?1023504 | ||
| secalert@redhat.com | http://support.apple.com/kb/HT4077 | ||
| secalert@redhat.com | http://svn.apache.org/viewvc?rev=892815&view=rev | ||
| secalert@redhat.com | http://svn.apache.org/viewvc?rev=902650&view=rev | ||
| secalert@redhat.com | http://tomcat.apache.org/security-5.html | ||
| secalert@redhat.com | http://tomcat.apache.org/security-6.html | ||
| secalert@redhat.com | http://ubuntu.com/usn/usn-899-1 | ||
| secalert@redhat.com | http://www.debian.org/security/2011/dsa-2207 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:176 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:177 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0119.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0580.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0582.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/509150/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/516397/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/37945 | ||
| secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2011-0003.html | ||
| secalert@redhat.com | http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/0213 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/1559 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/1986 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/55857 | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127420533226623&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133469267822771&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=136485229118404&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=139344343412337&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38316 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38346 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38541 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38687 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39317 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40330 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40813 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43310 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/57126 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023504 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4077 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?rev=892815&view=rev | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?rev=902650&view=rev | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-5.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://tomcat.apache.org/security-6.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://ubuntu.com/usn/usn-899-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2207 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:176 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:177 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0119.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0580.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0582.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/509150/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516397/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/37945 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0213 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1559 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1986 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/55857 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092 | 
| Vendor | Product | Version | |
|---|---|---|---|
| apache | tomcat | 5.5.0 | |
| apache | tomcat | 5.5.1 | |
| apache | tomcat | 5.5.2 | |
| apache | tomcat | 5.5.3 | |
| apache | tomcat | 5.5.4 | |
| apache | tomcat | 5.5.5 | |
| apache | tomcat | 5.5.6 | |
| apache | tomcat | 5.5.7 | |
| apache | tomcat | 5.5.8 | |
| apache | tomcat | 5.5.9 | |
| apache | tomcat | 5.5.10 | |
| apache | tomcat | 5.5.11 | |
| apache | tomcat | 5.5.12 | |
| apache | tomcat | 5.5.13 | |
| apache | tomcat | 5.5.14 | |
| apache | tomcat | 5.5.15 | |
| apache | tomcat | 5.5.16 | |
| apache | tomcat | 5.5.17 | |
| apache | tomcat | 5.5.18 | |
| apache | tomcat | 5.5.19 | |
| apache | tomcat | 5.5.20 | |
| apache | tomcat | 5.5.21 | |
| apache | tomcat | 5.5.22 | |
| apache | tomcat | 5.5.23 | |
| apache | tomcat | 5.5.24 | |
| apache | tomcat | 5.5.25 | |
| apache | tomcat | 5.5.26 | |
| apache | tomcat | 5.5.27 | |
| apache | tomcat | 5.5.28 | |
| apache | tomcat | 6.0 | |
| apache | tomcat | 6.0.0 | |
| apache | tomcat | 6.0.1 | |
| apache | tomcat | 6.0.2 | |
| apache | tomcat | 6.0.3 | |
| apache | tomcat | 6.0.4 | |
| apache | tomcat | 6.0.5 | |
| apache | tomcat | 6.0.6 | |
| apache | tomcat | 6.0.7 | |
| apache | tomcat | 6.0.8 | |
| apache | tomcat | 6.0.9 | |
| apache | tomcat | 6.0.10 | |
| apache | tomcat | 6.0.11 | |
| apache | tomcat | 6.0.12 | |
| apache | tomcat | 6.0.13 | |
| apache | tomcat | 6.0.14 | |
| apache | tomcat | 6.0.15 | |
| apache | tomcat | 6.0.16 | |
| apache | tomcat | 6.0.17 | |
| apache | tomcat | 6.0.18 | |
| apache | tomcat | 6.0.19 | |
| apache | tomcat | 6.0.20 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E98B82A-22E5-4E6C-90AE-56F5780EA147",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34672E90-C220-436B-9143-480941227933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "92883AFA-A02F-41A5-9977-ABEAC8AD2970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "989A78F8-EE92-465F-8A8D-ECF0B58AFE7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFB09F3-32D1-479C-8C39-D7329D9A6623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D56581E2-9ECD-426A-96D8-A9D958900AD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "717F6995-5AF0-484C-90C0-A82F25FD2E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B0C01D5-773F-469C-9E69-170C2844AAA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB03FDFB-4DBF-4B70-BFA3-570D1DE67695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F5CF79C-759B-4FF9-90EE-847264059E93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "357651FD-392E-4775-BF20-37A23B3ABAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "585B9476-6B86-4809-9B9E-26112114CB59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6145036D-4FCE-4EBE-A137-BDFA69BA54F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E437055A-0A81-413F-AB08-0E9D0DC9EA30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "9276A093-9C98-4617-9941-2276995F5848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98575E2-E39A-4A8F-B5B5-BD280B8367BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "5878E08E-2741-4798-94E9-BA8E07386B12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F6BAB7-C099-4345-A632-7287AEA555B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3AAF031-D16B-4D51-9581-2D1376A5157B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "51120689-F5C0-4DF1-91AA-314C40A46C58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "F67477AB-85F6-421C-9C0B-C8EFB1B200CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D0C265-2ED9-42CF-A7D6-C7FAE4246A1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D70CFD9-B55D-4A29-B94C-D33F3E881A8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1195878-CCC9-49BC-9AC7-1F88F0DFAB82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D11D6FB7-CBDB-48C1-98CB-1B3CAA36C5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "49E3C039-A949-4F1B-892A-57147EECB249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28C7801-41B9-4552-BA1E-577967BCBBEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B21085-7259-4685-9D1F-FF98E6489E10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "635EE321-2A1F-4FF8-95BE-0C26591969D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A81B035-8598-4D2C-B45F-C6C9D4B10C2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1096947-82A6-4EA8-A4F2-00D91E3F7DAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C95ADA4-66F5-45C4-A677-ACE22367A75A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "11951A10-39A2-4FF5-8C43-DF94730FB794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "351E5BCF-A56B-4D91-BA3C-21A4B77D529A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DC2BBB4-171E-4EFF-A575-A5B7FF031755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B6B0504-27C1-4824-A928-A878CBBAB32D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D903956B-14F5-4177-AF12-0A5F1846D3C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F847DC-A2F5-456C-9038-16A0E85F4C3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EBD00-1E1E-452D-AFFB-08A6BD111DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6B93A3A-D487-4CA1-8257-26F8FE287B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8802B2-57E0-4AA6-BC8E-00DE60468569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "8461DF95-18DC-4BF5-A703-7F19DA88DC30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4C9BCF-9C73-4991-B02F-E08C5DA06EBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en Apache Tomcat desde v5.5.0 hasta v5.5.28 y desde v6.0.0 hasta v6.0.20 permite a atacantes remotos borrar ficheros del directorio de trabajo a trav\u00e9s de secuencias de salto de directorio en un nombre de fichero WAR, como se demuestra en ..war nombre de fichero."
    }
  ],
  "id": "CVE-2009-2902",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-01-28T20:30:01.323",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38316"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/38346"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/38541"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/38687"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/39317"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40330"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40813"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/43310"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/57126"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1023504"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://tomcat.apache.org/security-5.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://tomcat.apache.org/security-6.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-899-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2207"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0119.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/509150/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/37945"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/0213"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1559"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1986"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38346"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38541"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/38687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40330"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/57126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://tomcat.apache.org/security-5.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://tomcat.apache.org/security-6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-899-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0119.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0580.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0582.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/509150/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/37945"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0213"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1559"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1986"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7092"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2902\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\n\nThis issue has been addressed in JBoss Enterprise Web Server 1.0.1: https://rhn.redhat.com/errata/RHSA-2010-0119.html",
      "lastModified": "2010-03-02T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-8wch-9gcg-v2pr
Vulnerability from github
Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
{
  "affected": [
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c= 5.5.28"
      },
      "package": {
        "ecosystem": "Maven",
        "name": "org.apache.tomcat:tomcat"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "5.5.0"
            },
            {
              "fixed": "5.5.29"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c= 6.0.20"
      },
      "package": {
        "ecosystem": "Maven",
        "name": "org.apache.tomcat:tomcat"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "6.0.0"
            },
            {
              "fixed": "6.0.24"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2009-2902"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-22"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2022-06-17T22:10:05Z",
    "nvd_published_at": "2010-01-28T20:30:00Z",
    "severity": "MODERATE"
  },
  "details": "Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.",
  "id": "GHSA-8wch-9gcg-v2pr",
  "modified": "2024-02-21T17:35:45Z",
  "published": "2022-05-02T03:39:48Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2902"
    },
    {
      "type": "WEB",
      "url": "https://github.com/apache/tomcat/commit/3e1010b1a2f648581fac3d68afbf18f2979f6bf6"
    },
    {
      "type": "WEB",
      "url": "https://github.com/apache/tomcat55/commit/0299cb724ea71f304d54adfcdb950f59b01fb421"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20150308000602/http://www.securityfocus.com/archive/1/509150/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20140515000000*/http://secunia.com/advisories/57126"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20121211195847/http://www.securityfocus.com/bid/37945"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20121211115829/http://securitytracker.com/id?1023504"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20111119150528/http://www.securityfocus.com/archive/1/516397/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20110601000000*/http://secunia.com/advisories/40330"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20110529135656/http://secunia.com/advisories/38541"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20110213053623/https://secunia.com/advisories/43310"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20100601000000*/http://secunia.com/advisories/40813"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20100412065745/http://secunia.com/advisories/39317"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20100329100145/http://secunia.com/advisories/38687"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20100127190258/http://secunia.com/advisories/38316"
    },
    {
      "type": "WEB",
      "url": "https://web.archive.org/web/20100127015355/http://secunia.com/advisories/38346"
    },
    {
      "type": "WEB",
      "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=c02241113"
    },
    {
      "type": "WEB",
      "url": "https://support.apple.com/kb/HT4077"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7092"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:19431"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/apache/tomcat"
    },
    {
      "type": "WEB",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55857"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2010:0582"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2010:0580"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2010:0119"
    },
    {
      "type": "WEB",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=bugtraq\u0026m=127420533226623\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://svn.apache.org/viewvc?rev=892815\u0026view=rev"
    },
    {
      "type": "WEB",
      "url": "http://svn.apache.org/viewvc?rev=902650\u0026view=rev"
    },
    {
      "type": "WEB",
      "url": "http://tomcat.apache.org/security-5.html"
    },
    {
      "type": "WEB",
      "url": "http://tomcat.apache.org/security-6.html"
    },
    {
      "type": "WEB",
      "url": "http://ubuntu.com/usn/usn-899-1"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2011/dsa-2207"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"
    },
    {
      "type": "WEB",
      "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
    },
    {
      "type": "WEB",
      "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [],
  "summary": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) in Apache Tomcat"
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.