Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-3382 (GCVE-0-2007-3382)
Vulnerability from cvelistv5 – Published: 2007-08-14 22:00 – Updated: 2024-08-07 14:14- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:14:12.904Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-1453",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1453"
},
{
"name": "RHSA-2007:0950",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0950.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "20070814 Re: CVE-2007-3382: Handling of cookies containing a \u0027 character",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/476466/100/0/threaded"
},
{
"name": "ADV-2008-1981",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "FEDORA-2007-3456",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{
"name": "27267",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27267"
},
{
"name": "29242",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29242"
},
{
"name": "ADV-2007-3527",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3527"
},
{
"name": "1018556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018556"
},
{
"name": "26466",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26466"
},
{
"name": "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{
"name": "SUSE-SR:2008:005",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name": "33668",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33668"
},
{
"name": "ADV-2007-2902",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2902"
},
{
"name": "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{
"name": "26898",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26898"
},
{
"name": "28361",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28361"
},
{
"name": "IZ55562",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562"
},
{
"name": "SSRT071472",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "28317",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28317"
},
{
"name": "APPLE-SA-2008-06-30",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "ADV-2009-0233",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0233"
},
{
"name": "SUSE-SR:2009:004",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "RHSA-2007:0871",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html"
},
{
"name": "ADV-2007-3386",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "30802",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30802"
},
{
"name": "RHSA-2008:0195",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "27037",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27037"
},
{
"name": "25316",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25316"
},
{
"name": "VU#993544",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/993544"
},
{
"name": "SSRT071447",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "27727",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27727"
},
{
"name": "HPSBUX02262",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "20070814 CVE-2007-3382: Handling of cookies containing a \u0027 character",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/476442/100/0/threaded"
},
{
"name": "RHSA-2008:0261",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"name": "36486",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36486"
},
{
"name": "HPSBTU02276",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "DSA-1447",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"name": "oval:org.mitre.oval:def:11269",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
},
{
"name": "tomcat-quotecookie-information-disclosure(36006)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36006"
},
{
"name": "MDKSA-2007:241",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:241"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-14T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-13T16:07:21.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "DSA-1453",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1453"
},
{
"name": "RHSA-2007:0950",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0950.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "20070814 Re: CVE-2007-3382: Handling of cookies containing a \u0027 character",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/476466/100/0/threaded"
},
{
"name": "ADV-2008-1981",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "FEDORA-2007-3456",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{
"name": "27267",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27267"
},
{
"name": "29242",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29242"
},
{
"name": "ADV-2007-3527",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3527"
},
{
"name": "1018556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018556"
},
{
"name": "26466",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26466"
},
{
"name": "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{
"name": "SUSE-SR:2008:005",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name": "33668",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33668"
},
{
"name": "ADV-2007-2902",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2902"
},
{
"name": "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{
"name": "26898",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26898"
},
{
"name": "28361",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28361"
},
{
"name": "IZ55562",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562"
},
{
"name": "SSRT071472",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "28317",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28317"
},
{
"name": "APPLE-SA-2008-06-30",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "ADV-2009-0233",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0233"
},
{
"name": "SUSE-SR:2009:004",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "RHSA-2007:0871",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html"
},
{
"name": "ADV-2007-3386",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "30802",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30802"
},
{
"name": "RHSA-2008:0195",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "27037",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27037"
},
{
"name": "25316",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25316"
},
{
"name": "VU#993544",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/993544"
},
{
"name": "SSRT071447",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "27727",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27727"
},
{
"name": "HPSBUX02262",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "20070814 CVE-2007-3382: Handling of cookies containing a \u0027 character",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/476442/100/0/threaded"
},
{
"name": "RHSA-2008:0261",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"name": "36486",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36486"
},
{
"name": "HPSBTU02276",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "DSA-1447",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"name": "oval:org.mitre.oval:def:11269",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
},
{
"name": "tomcat-quotecookie-information-disclosure(36006)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36006"
},
{
"name": "MDKSA-2007:241",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:241"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-3382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-1453",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1453"
},
{
"name": "RHSA-2007:0950",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0950.html"
},
{
"name": "http://support.apple.com/kb/HT2163",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "20070814 Re: CVE-2007-3382: Handling of cookies containing a \u0027 character",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/476466/100/0/threaded"
},
{
"name": "ADV-2008-1981",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "FEDORA-2007-3456",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{
"name": "27267",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27267"
},
{
"name": "29242",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29242"
},
{
"name": "ADV-2007-3527",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3527"
},
{
"name": "1018556",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018556"
},
{
"name": "26466",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26466"
},
{
"name": "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{
"name": "SUSE-SR:2008:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name": "33668",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33668"
},
{
"name": "ADV-2007-2902",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2902"
},
{
"name": "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{
"name": "26898",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26898"
},
{
"name": "28361",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28361"
},
{
"name": "IZ55562",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562"
},
{
"name": "SSRT071472",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "28317",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28317"
},
{
"name": "APPLE-SA-2008-06-30",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "ADV-2009-0233",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0233"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "RHSA-2007:0871",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html"
},
{
"name": "ADV-2007-3386",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "30802",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30802"
},
{
"name": "RHSA-2008:0195",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "27037",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27037"
},
{
"name": "25316",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25316"
},
{
"name": "VU#993544",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/993544"
},
{
"name": "SSRT071447",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "27727",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27727"
},
{
"name": "HPSBUX02262",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "20070814 CVE-2007-3382: Handling of cookies containing a \u0027 character",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/476442/100/0/threaded"
},
{
"name": "RHSA-2008:0261",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"name": "36486",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36486"
},
{
"name": "HPSBTU02276",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "DSA-1447",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx",
"refsource": "CONFIRM",
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"name": "oval:org.mitre.oval:def:11269",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269"
},
{
"name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540",
"refsource": "CONFIRM",
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
},
{
"name": "tomcat-quotecookie-information-disclosure(36006)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36006"
},
{
"name": "MDKSA-2007:241",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:241"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2007-3382",
"datePublished": "2007-08-14T22:00:00.000Z",
"dateReserved": "2007-06-25T00:00:00.000Z",
"dateUpdated": "2024-08-07T14:14:12.904Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2007-3382",
"date": "2026-05-21",
"epss": "0.83908",
"percentile": "0.99309"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0CDF9E1-9412-450E-B1D4-438F128FFF9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32561F50-6385-4D71-AFAC-3D2F8DB55A4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D51D88E7-6F5C-42B0-BAD6-7DCD9A357B43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C091BCC4-4B19-4304-A807-FE3BB3BCC8CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E300013-0CE7-4313-A553-74A6A247B3E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E08D7414-8D0C-45D6-8E87-679DF0201D55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60CFD9CA-1878-4C74-A9BD-5D581736E6B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7E52BE7-5281-4430-8846-E41CF34FC214\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBDA8066-294D-431E-B026-C03707DFBCD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C92F3744-C8F9-4E29-BF1A-25E03A32F2C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1D9BD7E-FCC2-404B-A057-1A10997DAFF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A79DA2C-35F3-47DE-909B-8D8D1AE111C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17522878-4266-432A-859D-C02096C8AC0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A28B11A-3BC7-41BC-8970-EE075B029F5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13D9B12F-F36A-424E-99BB-E00EF0FCA277\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A8FEEF0-8E57-43B1-8316-228B76E458D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D82F3FAE-91AD-4F0B-A1F7-11C1A97C5ECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3B2802B-E56C-462A-9601-361A9166B5F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"190FB4FD-22A5-4771-8F99-1E260A36A474\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BD3785E-3A09-4BE4-96C7-619B8A7D5062\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"285F7969-09F6-48CC-89CE-928225A53CDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B9EDACC-0300-4DA7-B1CD-5F7A6029AF38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B387EF0-94AD-4C8E-8CD4-4F5F706481BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA486065-18D5-4425-ADA5-284101919564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0141E20-2E3D-4CD0-A757-D7CA98499CCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E62493D-FEAE-49E8-A293-CE18451D0264\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA01AB58-CAB2-420A-9899-EAB153DD898A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D731AFDD-9C33-4DC8-9BC6-06BB51048752\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01706205-1369-4E5D-8936-723DA980CA9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DC4A52C-6FBC-420A-885A-F72BC1DBAEC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A1C882D-949B-40B9-BC9F-E7FCE4FE7C3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A1451D2-B905-4AD7-9BD7-10CF2A12BA34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C505696B-10E4-4B99-A598-40FA0DA39F7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EB2F3D8-25A1-408E-80D0-59D52A901284\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3904E9A-585A-4005-B2E9-13538535383D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA1934BF-83E3-4B0B-A1DF-391A5332CE39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F06B9809-5BFA-4DB9-8753-1D8319713879\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF6631B0-9F2E-4C5F-AB21-F085A8C1559B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15625451-E56D-405F-BE9B-B3CB1A35E929\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97ADBDC4-B669-467D-9A07-9A2DD8B68374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DA876C8-4417-4C35-9FEC-278D45CE6E92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03C08A88-9377-4B32-8173-EE2D121B06D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7225A43-8EAE-4DA6-BBDC-4418D5444767\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A46C0933-3B19-40EA-8DED-2BF25AB85C17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E98B82A-22E5-4E6C-90AE-56F5780EA147\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34672E90-C220-436B-9143-480941227933\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92883AFA-A02F-41A5-9977-ABEAC8AD2970\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"989A78F8-EE92-465F-8A8D-ECF0B58AFE7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACFB09F3-32D1-479C-8C39-D7329D9A6623\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D56581E2-9ECD-426A-96D8-A9D958900AD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"717F6995-5AF0-484C-90C0-A82F25FD2E32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B0C01D5-773F-469C-9E69-170C2844AAA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F5CF79C-759B-4FF9-90EE-847264059E93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"357651FD-392E-4775-BF20-37A23B3ABAE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585B9476-6B86-4809-9B9E-26112114CB59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9276A093-9C98-4617-9941-2276995F5848\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5878E08E-2741-4798-94E9-BA8E07386B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69F6BAB7-C099-4345-A632-7287AEA555B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3AAF031-D16B-4D51-9581-2D1376A5157B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51120689-F5C0-4DF1-91AA-314C40A46C58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49E3C039-A949-4F1B-892A-57147EECB249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F28C7801-41B9-4552-BA1E-577967BCBBEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25B21085-7259-4685-9D1F-FF98E6489E10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"635EE321-2A1F-4FF8-95BE-0C26591969D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11951A10-39A2-4FF5-8C43-DF94730FB794\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B6B0504-27C1-4824-A928-A878CBBAB32D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\\\"\u0027\\\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.\"}, {\"lang\": \"es\", \"value\": \"Apache Tomcat 6.0.0 hasta 6.0.13, 5.5.0 hasta 5.5.24, 5.0.0 hasta 5.0.30, 4.1.0 hasta 4.1.36, y 3.3 hasta 3.3.2 trata las comillas simples (\\\"\u0027\\\") como delimitadores en las cookies, lo cual podr\\u00eda provocar que informaci\\u00f3n sensible como los identificadores de sesi\\u00f3n se filtre y permita a atacantes remotos llevar a cabo ataques de secuestro de sesi\\u00f3n.\"}]",
"id": "CVE-2007-3382",
"lastModified": "2024-11-21T00:33:06.087",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2007-08-14T22:17:00.000",
"references": "[{\"url\": \"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26466\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26898\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27037\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27267\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27727\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28317\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28361\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/29242\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/30802\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/33668\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/36486\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securitytracker.com/id?1018556\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.apple.com/kb/HT2163\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://tomcat.apache.org/security-6.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1447\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1453\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/993544\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:241\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0871.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0950.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0195.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0261.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/476442/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/476466/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/500396/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/500412/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/25316\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2902\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3386\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3527\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1981/references\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0233\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/36006\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26466\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26898\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27037\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27267\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27727\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28317\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28361\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/29242\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/30802\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/33668\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36486\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1018556\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT2163\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://tomcat.apache.org/security-6.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1447\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/993544\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:241\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0871.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0950.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0195.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0261.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/476442/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/476466/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/500396/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/500412/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/25316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2902\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3386\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/3527\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1981/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0233\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/36006\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-3382\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-08-14T22:17:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\\\"\u0027\\\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.\"},{\"lang\":\"es\",\"value\":\"Apache Tomcat 6.0.0 hasta 6.0.13, 5.5.0 hasta 5.5.24, 5.0.0 hasta 5.0.30, 4.1.0 hasta 4.1.36, y 3.3 hasta 3.3.2 trata las comillas simples (\\\"\u0027\\\") como delimitadores en las cookies, lo cual podr\u00eda provocar que informaci\u00f3n sensible como los identificadores de sesi\u00f3n se filtre y permita a atacantes remotos llevar a cabo ataques de secuestro de sesi\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0CDF9E1-9412-450E-B1D4-438F128FFF9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32561F50-6385-4D71-AFAC-3D2F8DB55A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D51D88E7-6F5C-42B0-BAD6-7DCD9A357B43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C091BCC4-4B19-4304-A807-FE3BB3BCC8CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E300013-0CE7-4313-A553-74A6A247B3E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08D7414-8D0C-45D6-8E87-679DF0201D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60CFD9CA-1878-4C74-A9BD-5D581736E6B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7E52BE7-5281-4430-8846-E41CF34FC214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBDA8066-294D-431E-B026-C03707DFBCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C92F3744-C8F9-4E29-BF1A-25E03A32F2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D9BD7E-FCC2-404B-A057-1A10997DAFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A79DA2C-35F3-47DE-909B-8D8D1AE111C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17522878-4266-432A-859D-C02096C8AC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A28B11A-3BC7-41BC-8970-EE075B029F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13D9B12F-F36A-424E-99BB-E00EF0FCA277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8FEEF0-8E57-43B1-8316-228B76E458D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D82F3FAE-91AD-4F0B-A1F7-11C1A97C5ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B2802B-E56C-462A-9601-361A9166B5F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190FB4FD-22A5-4771-8F99-1E260A36A474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD3785E-3A09-4BE4-96C7-619B8A7D5062\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"285F7969-09F6-48CC-89CE-928225A53CDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9EDACC-0300-4DA7-B1CD-5F7A6029AF38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B387EF0-94AD-4C8E-8CD4-4F5F706481BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA486065-18D5-4425-ADA5-284101919564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0141E20-2E3D-4CD0-A757-D7CA98499CCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62493D-FEAE-49E8-A293-CE18451D0264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA01AB58-CAB2-420A-9899-EAB153DD898A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D731AFDD-9C33-4DC8-9BC6-06BB51048752\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01706205-1369-4E5D-8936-723DA980CA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC4A52C-6FBC-420A-885A-F72BC1DBAEC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A1C882D-949B-40B9-BC9F-E7FCE4FE7C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1451D2-B905-4AD7-9BD7-10CF2A12BA34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C505696B-10E4-4B99-A598-40FA0DA39F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB2F3D8-25A1-408E-80D0-59D52A901284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3904E9A-585A-4005-B2E9-13538535383D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA1934BF-83E3-4B0B-A1DF-391A5332CE39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F06B9809-5BFA-4DB9-8753-1D8319713879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF6631B0-9F2E-4C5F-AB21-F085A8C1559B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15625451-E56D-405F-BE9B-B3CB1A35E929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97ADBDC4-B669-467D-9A07-9A2DD8B68374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA876C8-4417-4C35-9FEC-278D45CE6E92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C08A88-9377-4B32-8173-EE2D121B06D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7225A43-8EAE-4DA6-BBDC-4418D5444767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46C0933-3B19-40EA-8DED-2BF25AB85C17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E98B82A-22E5-4E6C-90AE-56F5780EA147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34672E90-C220-436B-9143-480941227933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92883AFA-A02F-41A5-9977-ABEAC8AD2970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989A78F8-EE92-465F-8A8D-ECF0B58AFE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACFB09F3-32D1-479C-8C39-D7329D9A6623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D56581E2-9ECD-426A-96D8-A9D958900AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717F6995-5AF0-484C-90C0-A82F25FD2E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0C01D5-773F-469C-9E69-170C2844AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB03FDFB-4DBF-4B70-BFA3-570D1DE67695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5CF79C-759B-4FF9-90EE-847264059E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"357651FD-392E-4775-BF20-37A23B3ABAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585B9476-6B86-4809-9B9E-26112114CB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6145036D-4FCE-4EBE-A137-BDFA69BA54F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E437055A-0A81-413F-AB08-0E9D0DC9EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9276A093-9C98-4617-9941-2276995F5848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98575E2-E39A-4A8F-B5B5-BD280B8367BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5878E08E-2741-4798-94E9-BA8E07386B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69F6BAB7-C099-4345-A632-7287AEA555B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3AAF031-D16B-4D51-9581-2D1376A5157B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51120689-F5C0-4DF1-91AA-314C40A46C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E3C039-A949-4F1B-892A-57147EECB249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28C7801-41B9-4552-BA1E-577967BCBBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B21085-7259-4685-9D1F-FF98E6489E10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635EE321-2A1F-4FF8-95BE-0C26591969D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A81B035-8598-4D2C-B45F-C6C9D4B10C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1096947-82A6-4EA8-A4F2-00D91E3F7DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C95ADA4-66F5-45C4-A677-ACE22367A75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11951A10-39A2-4FF5-8C43-DF94730FB794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351E5BCF-A56B-4D91-BA3C-21A4B77D529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC2BBB4-171E-4EFF-A575-A5B7FF031755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B6B0504-27C1-4824-A928-A878CBBAB32D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045\"}]}]}],\"references\":[{\"url\":\"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26466\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26898\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27037\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27267\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27727\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28317\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28361\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29242\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30802\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33668\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36486\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1018556\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT2163\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1447\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1453\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/993544\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:241\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0871.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0950.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0195.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0261.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/476442/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/476466/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/500396/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/500412/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/25316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2902\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3386\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3527\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1981/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0233\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36006\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27267\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27727\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29242\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33668\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36486\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1018556\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT2163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tomcat.apache.org/security-6.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/993544\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0871.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0950.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0195.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0261.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/476442/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/476466/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/500396/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/500412/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/25316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2902\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1981/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0233\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2007-AVI-362
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités du moteur de servlets Tomcat permettent à un utilisateur malveillant de réaliser des injections de code indirectes ou de voler des identifiants de session.
Description
Plusieurs vulnérabilités sont présentes dans le moteur de servlets Tomcat :
- (CVE-2007-2449 et CVE-2007-3383) les exemples de JSP livrés avec le logiciels ne filtrent pas les données entrées par l'utilisateur. Cette absence de filtrage permet la réalisation malveillante d'injections de code indirectes (cross site scripting) ;
- (CVE-2007-2450) les applications web Manager et Host Manager ne filtrent pas les données entrées par l'utilisateur. Cette absence de filtrage permet la réalisation malveillante d'injections de code indirectes (cross site scripting) ;
- (CVE-2007-3382) le moteur Tomcat ne traite pas de manière correcte le caractère apostrophe (') quand il sert de délimiteur dans des cookies. Dans certaines conditions, cette erreur permet la divulgation de l'identifiant de session et le détournement de cette session ;
- (CVE-2007-3385) le moteur Tomcat ne traite pas de manière correcte la séquence de caractères /TT> utilisée des cookies. Dans certaines conditions, cette erreur permet la divulgation de l'identifiant de session et le détournement de cette session ;
- (CVE-2007-3386) la servlet Host Manager ne filtre pas les données entrées par l'utilisateur. Cette absence de filtrage permet la réalisation malveillante d'injections de code indirectes (cross site scripting).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Tomcat, versions antérieures à 6.0.14.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cSPAN class=\"textit\"\u003eTomcat\u003c/SPAN\u003e, versions ant\u00e9rieures \u00e0 6.0.14.\u003c/P\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le moteur de servlets\nTomcat :\n\n- (CVE-2007-2449 et CVE-2007-3383) les exemples de JSP livr\u00e9s avec le\n logiciels ne filtrent pas les donn\u00e9es entr\u00e9es par l\u0027utilisateur.\n Cette absence de filtrage permet la r\u00e9alisation malveillante\n d\u0027injections de code indirectes (cross site scripting) ;\n- (CVE-2007-2450) les applications web Manager et Host Manager ne\n filtrent pas les donn\u00e9es entr\u00e9es par l\u0027utilisateur. Cette absence de\n filtrage permet la r\u00e9alisation malveillante d\u0027injections de code\n indirectes (cross site scripting) ;\n- (CVE-2007-3382) le moteur Tomcat ne traite pas de mani\u00e8re correcte\n le caract\u00e8re apostrophe (\u0027) quand il sert de d\u00e9limiteur dans des\n cookies. Dans certaines conditions, cette erreur permet la\n divulgation de l\u0027identifiant de session et le d\u00e9tournement de cette\n session ;\n- (CVE-2007-3385) le moteur Tomcat ne traite pas de mani\u00e8re correcte\n la s\u00e9quence de caract\u00e8res /TT\\\u003e utilis\u00e9e des cookies. Dans certaines\n conditions, cette erreur permet la divulgation de l\u0027identifiant de\n session et le d\u00e9tournement de cette session ;\n- (CVE-2007-3386) la servlet Host Manager ne filtre pas les donn\u00e9es\n entr\u00e9es par l\u0027utilisateur. Cette absence de filtrage permet la\n r\u00e9alisation malveillante d\u0027injections de code indirectes (cross site\n scripting).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2450"
},
{
"name": "CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"name": "CVE-2007-3383",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3383"
},
{
"name": "CVE-2007-3386",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3386"
},
{
"name": "CVE-2007-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2449"
},
{
"name": "CVE-2007-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1355"
},
{
"name": "CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
}
],
"links": [
{
"title": "Bulletins de s\u00e9curit\u00e9 du projet Tomcat :",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 du projet Tomcat :",
"url": "http://tomcat.apache.org/security-5.html"
}
],
"reference": "CERTA-2007-AVI-362",
"revisions": [
{
"description": "\u003cTT\u003eversion initiale.\u003c/TT\u003e",
"revision_date": "2007-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s du moteur de \u003cspan\nclass=\"textit\"\u003eservlets\u003c/span\u003e \u003cspan class=\"textit\"\u003eTomcat\u003c/span\u003e\npermettent \u00e0 un utilisateur malveillant de r\u00e9aliser des injections de\ncode indirectes ou de voler des identifiants de session.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de Tomcat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 du projet Tomcat",
"url": null
}
]
}
CERTA-2008-AVI-343
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérablités concernant le système d'exploitation Apple Mac OS X ont été corrigées.
Description
Plusieurs vulnérablités ont été corrigées :
- Alias Manager : un alias spécifiquement créé permet l'exécution de code arbitraire ;
- CoresTypes : des contenus incertains peuvent être ouverts automatiquement ;
- c++filt : une chaine de caratères spécifiquement créée permet l'exécution de code arbitraire ;
- Dock : une personne ayant physiquement accès à la machine peut contourner l'écran de verrouillage ;
- Launch Services : du code malveillant peut être exécuté via un site Web malveillant ;
- Net-SNMP : il est possible de contrefaire un paquet SNMPv3 ;
- Ruby : une chaine de caractères ou un tableau spécifiquement créé permet l'exécution de code arbitraire ;
- SMB File Server : une trame SMB spécialement réalisée permet l'exécution de code arbitraire ;
- System Configuration : un utilisateur local peut exécuter du code arbitraire avec les droits de nouveaux utilisateurs ;
- Tomcat : plusieurs vulnérabilités affectent le logiciel dont une permettant des attaques de type Cross Site Scripting ;
- VPN : un attaquant peut réaliser un déni de service à distance à l'aide de paquets UDP spécifiquement créés ;
- Webkit : du code malveillant peut être exécuté via un site Web malveillant.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple Mac OS X versions v10.5.3 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eApple Mac OS X versions v10.5.3 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rablit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es :\n\n- Alias Manager : un alias sp\u00e9cifiquement cr\u00e9\u00e9 permet l\u0027ex\u00e9cution de\n code arbitraire ;\n- CoresTypes : des contenus incertains peuvent \u00eatre ouverts\n automatiquement ;\n- c++filt : une chaine de carat\u00e8res sp\u00e9cifiquement cr\u00e9\u00e9e permet\n l\u0027ex\u00e9cution de code arbitraire ;\n- Dock : une personne ayant physiquement acc\u00e8s \u00e0 la machine peut\n contourner l\u0027\u00e9cran de verrouillage ;\n- Launch Services : du code malveillant peut \u00eatre ex\u00e9cut\u00e9 via un site\n Web malveillant ;\n- Net-SNMP : il est possible de contrefaire un paquet SNMPv3 ;\n- Ruby : une chaine de caract\u00e8res ou un tableau sp\u00e9cifiquement cr\u00e9\u00e9\n permet l\u0027ex\u00e9cution de code arbitraire ;\n- SMB File Server : une trame SMB sp\u00e9cialement r\u00e9alis\u00e9e permet\n l\u0027ex\u00e9cution de code arbitraire ;\n- System Configuration : un utilisateur local peut ex\u00e9cuter du code\n arbitraire avec les droits de nouveaux utilisateurs ;\n- Tomcat : plusieurs vuln\u00e9rabilit\u00e9s affectent le logiciel dont une\n permettant des attaques de type Cross Site Scripting ;\n- VPN : un attaquant peut r\u00e9aliser un d\u00e9ni de service \u00e0 distance \u00e0\n l\u0027aide de paquets UDP sp\u00e9cifiquement cr\u00e9\u00e9s ;\n- Webkit : du code malveillant peut \u00eatre ex\u00e9cut\u00e9 via un site Web\n malveillant.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2663"
},
{
"name": "CVE-2007-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2450"
},
{
"name": "CVE-2008-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2309"
},
{
"name": "CVE-2008-2725",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2725"
},
{
"name": "CVE-2008-2313",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2313"
},
{
"name": "CVE-2008-1145",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1145"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2008-2311",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2311"
},
{
"name": "CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"name": "CVE-2007-3383",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3383"
},
{
"name": "CVE-2008-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1105"
},
{
"name": "CVE-2005-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3164"
},
{
"name": "CVE-2008-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0960"
},
{
"name": "CVE-2008-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2664"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2007-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2449"
},
{
"name": "CVE-2007-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1355"
},
{
"name": "CVE-2008-2726",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2726"
},
{
"name": "CVE-2008-2314",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2314"
},
{
"name": "CVE-2008-2662",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2662"
},
{
"name": "CVE-2008-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2307"
},
{
"name": "CVE-2008-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2308"
},
{
"name": "CVE-2007-6276",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6276"
},
{
"name": "CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"name": "CVE-2008-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2310"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2008-004 du 30 juin 2008 :",
"url": "http://support.apple.com/kb/HT2163"
}
],
"reference": "CERTA-2008-AVI-343",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rablit\u00e9s concernant le syst\u00e8me d\u0027exploitation Apple Mac\nOS X ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Apple 2008-004 du 30 juin 2008",
"url": null
}
]
}
CERTA-2009-AVI-032
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités affectent la version d'Apache Tomcat fournie avec CA Cohesion Application Configuration Manager.
Description
De multiples vulnérabilités affectent la version d'Apache Tomcat incluse dans CA Cohesion Application Configuration Manager. Ces vulnérabilités sont décrites dans les diverses références CVE (voir section Documentation) et permettent notamment de réaliser un déni de service à distance, d'injecter des scripts, d'afficher le contenu de certains fichiers, etc.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
CA Cohesion Application Configuration Manager version 4.5.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cSPAN class=\"textit\"\u003eCA Cohesion Application Configuration Manager\u003c/SPAN\u003e version 4.5.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s affectent la version d\u0027Apache Tomcat incluse\ndans CA Cohesion Application Configuration Manager. Ces vuln\u00e9rabilit\u00e9s\nsont d\u00e9crites dans les diverses r\u00e9f\u00e9rences CVE (voir section\nDocumentation) et permettent notamment de r\u00e9aliser un d\u00e9ni de service \u00e0\ndistance, d\u0027injecter des scripts, d\u0027afficher le contenu de certains\nfichiers, etc.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2450"
},
{
"name": "CVE-2007-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0450"
},
{
"name": "CVE-2008-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0128"
},
{
"name": "CVE-2007-1858",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1858"
},
{
"name": "CVE-2007-1358",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1358"
},
{
"name": "CVE-2006-7196",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7196"
},
{
"name": "CVE-2005-2090",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2090"
},
{
"name": "CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"name": "CVE-2005-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3510"
},
{
"name": "CVE-2006-3835",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3835"
},
{
"name": "CVE-2007-3386",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3386"
},
{
"name": "CVE-2007-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2449"
},
{
"name": "CVE-2007-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1355"
},
{
"name": "CVE-2006-7195",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7195"
},
{
"name": "CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
}
],
"links": [],
"reference": "CERTA-2009-AVI-032",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-01-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s affectent la version d\u0027\u003cspan\nclass=\"textit\"\u003eApache Tomcat\u003c/span\u003e fournie avec \u003cspan class=\"textit\"\u003eCA\nCohesion Application Configuration Manager\u003c/span\u003e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans CA Cohesion Application Configuration Manager",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 CA20090123-01 du 26 janvier 2009",
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
}
]
}
CERTA-2007-AVI-362
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités du moteur de servlets Tomcat permettent à un utilisateur malveillant de réaliser des injections de code indirectes ou de voler des identifiants de session.
Description
Plusieurs vulnérabilités sont présentes dans le moteur de servlets Tomcat :
- (CVE-2007-2449 et CVE-2007-3383) les exemples de JSP livrés avec le logiciels ne filtrent pas les données entrées par l'utilisateur. Cette absence de filtrage permet la réalisation malveillante d'injections de code indirectes (cross site scripting) ;
- (CVE-2007-2450) les applications web Manager et Host Manager ne filtrent pas les données entrées par l'utilisateur. Cette absence de filtrage permet la réalisation malveillante d'injections de code indirectes (cross site scripting) ;
- (CVE-2007-3382) le moteur Tomcat ne traite pas de manière correcte le caractère apostrophe (') quand il sert de délimiteur dans des cookies. Dans certaines conditions, cette erreur permet la divulgation de l'identifiant de session et le détournement de cette session ;
- (CVE-2007-3385) le moteur Tomcat ne traite pas de manière correcte la séquence de caractères /TT> utilisée des cookies. Dans certaines conditions, cette erreur permet la divulgation de l'identifiant de session et le détournement de cette session ;
- (CVE-2007-3386) la servlet Host Manager ne filtre pas les données entrées par l'utilisateur. Cette absence de filtrage permet la réalisation malveillante d'injections de code indirectes (cross site scripting).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Tomcat, versions antérieures à 6.0.14.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cSPAN class=\"textit\"\u003eTomcat\u003c/SPAN\u003e, versions ant\u00e9rieures \u00e0 6.0.14.\u003c/P\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le moteur de servlets\nTomcat :\n\n- (CVE-2007-2449 et CVE-2007-3383) les exemples de JSP livr\u00e9s avec le\n logiciels ne filtrent pas les donn\u00e9es entr\u00e9es par l\u0027utilisateur.\n Cette absence de filtrage permet la r\u00e9alisation malveillante\n d\u0027injections de code indirectes (cross site scripting) ;\n- (CVE-2007-2450) les applications web Manager et Host Manager ne\n filtrent pas les donn\u00e9es entr\u00e9es par l\u0027utilisateur. Cette absence de\n filtrage permet la r\u00e9alisation malveillante d\u0027injections de code\n indirectes (cross site scripting) ;\n- (CVE-2007-3382) le moteur Tomcat ne traite pas de mani\u00e8re correcte\n le caract\u00e8re apostrophe (\u0027) quand il sert de d\u00e9limiteur dans des\n cookies. Dans certaines conditions, cette erreur permet la\n divulgation de l\u0027identifiant de session et le d\u00e9tournement de cette\n session ;\n- (CVE-2007-3385) le moteur Tomcat ne traite pas de mani\u00e8re correcte\n la s\u00e9quence de caract\u00e8res /TT\\\u003e utilis\u00e9e des cookies. Dans certaines\n conditions, cette erreur permet la divulgation de l\u0027identifiant de\n session et le d\u00e9tournement de cette session ;\n- (CVE-2007-3386) la servlet Host Manager ne filtre pas les donn\u00e9es\n entr\u00e9es par l\u0027utilisateur. Cette absence de filtrage permet la\n r\u00e9alisation malveillante d\u0027injections de code indirectes (cross site\n scripting).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2450"
},
{
"name": "CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"name": "CVE-2007-3383",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3383"
},
{
"name": "CVE-2007-3386",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3386"
},
{
"name": "CVE-2007-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2449"
},
{
"name": "CVE-2007-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1355"
},
{
"name": "CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
}
],
"links": [
{
"title": "Bulletins de s\u00e9curit\u00e9 du projet Tomcat :",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 du projet Tomcat :",
"url": "http://tomcat.apache.org/security-5.html"
}
],
"reference": "CERTA-2007-AVI-362",
"revisions": [
{
"description": "\u003cTT\u003eversion initiale.\u003c/TT\u003e",
"revision_date": "2007-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s du moteur de \u003cspan\nclass=\"textit\"\u003eservlets\u003c/span\u003e \u003cspan class=\"textit\"\u003eTomcat\u003c/span\u003e\npermettent \u00e0 un utilisateur malveillant de r\u00e9aliser des injections de\ncode indirectes ou de voler des identifiants de session.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de Tomcat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 du projet Tomcat",
"url": null
}
]
}
CERTA-2008-AVI-343
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérablités concernant le système d'exploitation Apple Mac OS X ont été corrigées.
Description
Plusieurs vulnérablités ont été corrigées :
- Alias Manager : un alias spécifiquement créé permet l'exécution de code arbitraire ;
- CoresTypes : des contenus incertains peuvent être ouverts automatiquement ;
- c++filt : une chaine de caratères spécifiquement créée permet l'exécution de code arbitraire ;
- Dock : une personne ayant physiquement accès à la machine peut contourner l'écran de verrouillage ;
- Launch Services : du code malveillant peut être exécuté via un site Web malveillant ;
- Net-SNMP : il est possible de contrefaire un paquet SNMPv3 ;
- Ruby : une chaine de caractères ou un tableau spécifiquement créé permet l'exécution de code arbitraire ;
- SMB File Server : une trame SMB spécialement réalisée permet l'exécution de code arbitraire ;
- System Configuration : un utilisateur local peut exécuter du code arbitraire avec les droits de nouveaux utilisateurs ;
- Tomcat : plusieurs vulnérabilités affectent le logiciel dont une permettant des attaques de type Cross Site Scripting ;
- VPN : un attaquant peut réaliser un déni de service à distance à l'aide de paquets UDP spécifiquement créés ;
- Webkit : du code malveillant peut être exécuté via un site Web malveillant.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple Mac OS X versions v10.5.3 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eApple Mac OS X versions v10.5.3 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rablit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es :\n\n- Alias Manager : un alias sp\u00e9cifiquement cr\u00e9\u00e9 permet l\u0027ex\u00e9cution de\n code arbitraire ;\n- CoresTypes : des contenus incertains peuvent \u00eatre ouverts\n automatiquement ;\n- c++filt : une chaine de carat\u00e8res sp\u00e9cifiquement cr\u00e9\u00e9e permet\n l\u0027ex\u00e9cution de code arbitraire ;\n- Dock : une personne ayant physiquement acc\u00e8s \u00e0 la machine peut\n contourner l\u0027\u00e9cran de verrouillage ;\n- Launch Services : du code malveillant peut \u00eatre ex\u00e9cut\u00e9 via un site\n Web malveillant ;\n- Net-SNMP : il est possible de contrefaire un paquet SNMPv3 ;\n- Ruby : une chaine de caract\u00e8res ou un tableau sp\u00e9cifiquement cr\u00e9\u00e9\n permet l\u0027ex\u00e9cution de code arbitraire ;\n- SMB File Server : une trame SMB sp\u00e9cialement r\u00e9alis\u00e9e permet\n l\u0027ex\u00e9cution de code arbitraire ;\n- System Configuration : un utilisateur local peut ex\u00e9cuter du code\n arbitraire avec les droits de nouveaux utilisateurs ;\n- Tomcat : plusieurs vuln\u00e9rabilit\u00e9s affectent le logiciel dont une\n permettant des attaques de type Cross Site Scripting ;\n- VPN : un attaquant peut r\u00e9aliser un d\u00e9ni de service \u00e0 distance \u00e0\n l\u0027aide de paquets UDP sp\u00e9cifiquement cr\u00e9\u00e9s ;\n- Webkit : du code malveillant peut \u00eatre ex\u00e9cut\u00e9 via un site Web\n malveillant.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2663"
},
{
"name": "CVE-2007-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2450"
},
{
"name": "CVE-2008-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2309"
},
{
"name": "CVE-2008-2725",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2725"
},
{
"name": "CVE-2008-2313",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2313"
},
{
"name": "CVE-2008-1145",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1145"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2008-2311",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2311"
},
{
"name": "CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"name": "CVE-2007-3383",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3383"
},
{
"name": "CVE-2008-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1105"
},
{
"name": "CVE-2005-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3164"
},
{
"name": "CVE-2008-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0960"
},
{
"name": "CVE-2008-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2664"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2007-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2449"
},
{
"name": "CVE-2007-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1355"
},
{
"name": "CVE-2008-2726",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2726"
},
{
"name": "CVE-2008-2314",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2314"
},
{
"name": "CVE-2008-2662",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2662"
},
{
"name": "CVE-2008-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2307"
},
{
"name": "CVE-2008-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2308"
},
{
"name": "CVE-2007-6276",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6276"
},
{
"name": "CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"name": "CVE-2008-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2310"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2008-004 du 30 juin 2008 :",
"url": "http://support.apple.com/kb/HT2163"
}
],
"reference": "CERTA-2008-AVI-343",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rablit\u00e9s concernant le syst\u00e8me d\u0027exploitation Apple Mac\nOS X ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Apple 2008-004 du 30 juin 2008",
"url": null
}
]
}
CERTA-2009-AVI-032
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités affectent la version d'Apache Tomcat fournie avec CA Cohesion Application Configuration Manager.
Description
De multiples vulnérabilités affectent la version d'Apache Tomcat incluse dans CA Cohesion Application Configuration Manager. Ces vulnérabilités sont décrites dans les diverses références CVE (voir section Documentation) et permettent notamment de réaliser un déni de service à distance, d'injecter des scripts, d'afficher le contenu de certains fichiers, etc.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
CA Cohesion Application Configuration Manager version 4.5.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cSPAN class=\"textit\"\u003eCA Cohesion Application Configuration Manager\u003c/SPAN\u003e version 4.5.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s affectent la version d\u0027Apache Tomcat incluse\ndans CA Cohesion Application Configuration Manager. Ces vuln\u00e9rabilit\u00e9s\nsont d\u00e9crites dans les diverses r\u00e9f\u00e9rences CVE (voir section\nDocumentation) et permettent notamment de r\u00e9aliser un d\u00e9ni de service \u00e0\ndistance, d\u0027injecter des scripts, d\u0027afficher le contenu de certains\nfichiers, etc.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2450"
},
{
"name": "CVE-2007-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0450"
},
{
"name": "CVE-2008-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0128"
},
{
"name": "CVE-2007-1858",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1858"
},
{
"name": "CVE-2007-1358",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1358"
},
{
"name": "CVE-2006-7196",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7196"
},
{
"name": "CVE-2005-2090",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2090"
},
{
"name": "CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"name": "CVE-2005-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3510"
},
{
"name": "CVE-2006-3835",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3835"
},
{
"name": "CVE-2007-3386",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3386"
},
{
"name": "CVE-2007-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2449"
},
{
"name": "CVE-2007-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1355"
},
{
"name": "CVE-2006-7195",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7195"
},
{
"name": "CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
}
],
"links": [],
"reference": "CERTA-2009-AVI-032",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-01-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s affectent la version d\u0027\u003cspan\nclass=\"textit\"\u003eApache Tomcat\u003c/span\u003e fournie avec \u003cspan class=\"textit\"\u003eCA\nCohesion Application Configuration Manager\u003c/span\u003e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans CA Cohesion Application Configuration Manager",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 CA20090123-01 du 26 janvier 2009",
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
}
]
}
FKIE_CVE-2007-3382
Vulnerability from fkie_nvd - Published: 2007-08-14 22:17 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CDF9E1-9412-450E-B1D4-438F128FFF9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "32561F50-6385-4D71-AFAC-3D2F8DB55A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D51D88E7-6F5C-42B0-BAD6-7DCD9A357B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C091BCC4-4B19-4304-A807-FE3BB3BCC8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0E300013-0CE7-4313-A553-74A6A247B3E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E08D7414-8D0C-45D6-8E87-679DF0201D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "60CFD9CA-1878-4C74-A9BD-5D581736E6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "B7E52BE7-5281-4430-8846-E41CF34FC214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "CBDA8066-294D-431E-B026-C03707DFBCD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C92F3744-C8F9-4E29-BF1A-25E03A32F2C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D9BD7E-FCC2-404B-A057-1A10997DAFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "6A79DA2C-35F3-47DE-909B-8D8D1AE111C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "17522878-4266-432A-859D-C02096C8AC0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "5A28B11A-3BC7-41BC-8970-EE075B029F5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13D9B12F-F36A-424E-99BB-E00EF0FCA277",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8FEEF0-8E57-43B1-8316-228B76E458D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D82F3FAE-91AD-4F0B-A1F7-11C1A97C5ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B2802B-E56C-462A-9601-361A9166B5F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "190FB4FD-22A5-4771-8F99-1E260A36A474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD3785E-3A09-4BE4-96C7-619B8A7D5062",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "285F7969-09F6-48CC-89CE-928225A53CDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3B9EDACC-0300-4DA7-B1CD-5F7A6029AF38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6B387EF0-94AD-4C8E-8CD4-4F5F706481BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DA486065-18D5-4425-ADA5-284101919564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A0141E20-2E3D-4CD0-A757-D7CA98499CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62493D-FEAE-49E8-A293-CE18451D0264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FA01AB58-CAB2-420A-9899-EAB153DD898A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D731AFDD-9C33-4DC8-9BC6-06BB51048752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "01706205-1369-4E5D-8936-723DA980CA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0DC4A52C-6FBC-420A-885A-F72BC1DBAEC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1C882D-949B-40B9-BC9F-E7FCE4FE7C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1451D2-B905-4AD7-9BD7-10CF2A12BA34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C505696B-10E4-4B99-A598-40FA0DA39F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB2F3D8-25A1-408E-80D0-59D52A901284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "C3904E9A-585A-4005-B2E9-13538535383D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1934BF-83E3-4B0B-A1DF-391A5332CE39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F06B9809-5BFA-4DB9-8753-1D8319713879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6631B0-9F2E-4C5F-AB21-F085A8C1559B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "15625451-E56D-405F-BE9B-B3CB1A35E929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "97ADBDC4-B669-467D-9A07-9A2DD8B68374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA876C8-4417-4C35-9FEC-278D45CE6E92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "03C08A88-9377-4B32-8173-EE2D121B06D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "F7225A43-8EAE-4DA6-BBDC-4418D5444767",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A46C0933-3B19-40EA-8DED-2BF25AB85C17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E98B82A-22E5-4E6C-90AE-56F5780EA147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "34672E90-C220-436B-9143-480941227933",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "92883AFA-A02F-41A5-9977-ABEAC8AD2970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "989A78F8-EE92-465F-8A8D-ECF0B58AFE7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5B6627-B4A4-4E2D-B96C-CA37CCC8C804",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFB09F3-32D1-479C-8C39-D7329D9A6623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D56581E2-9ECD-426A-96D8-A9D958900AD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "717F6995-5AF0-484C-90C0-A82F25FD2E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C01D5-773F-469C-9E69-170C2844AAA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EB03FDFB-4DBF-4B70-BFA3-570D1DE67695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5CF79C-759B-4FF9-90EE-847264059E93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "357651FD-392E-4775-BF20-37A23B3ABAE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "585B9476-6B86-4809-9B9E-26112114CB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6145036D-4FCE-4EBE-A137-BDFA69BA54F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E437055A-0A81-413F-AB08-0E9D0DC9EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9276A093-9C98-4617-9941-2276995F5848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "97C9C36C-EF7E-4D42-9749-E2FF6CE35A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C98575E2-E39A-4A8F-B5B5-BD280B8367BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDA08E7-A417-44E8-9C89-EB22BEEC3B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD1B6BE-CF07-4DA8-A703-4A48506C8AD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5878E08E-2741-4798-94E9-BA8E07386B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "69F6BAB7-C099-4345-A632-7287AEA555B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "F3AAF031-D16B-4D51-9581-2D1376A5157B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "51120689-F5C0-4DF1-91AA-314C40A46C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "49E3C039-A949-4F1B-892A-57147EECB249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F28C7801-41B9-4552-BA1E-577967BCBBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "25B21085-7259-4685-9D1F-FF98E6489E10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "635EE321-2A1F-4FF8-95BE-0C26591969D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9A81B035-8598-4D2C-B45F-C6C9D4B10C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E1096947-82A6-4EA8-A4F2-00D91E3F7DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0EBFA1D3-16A6-4041-BB30-51D2EE0F2AF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B70B372F-EFFD-4AF7-99B5-7D1B23A0C54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9C95ADA4-66F5-45C4-A677-ACE22367A75A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "11951A10-39A2-4FF5-8C43-DF94730FB794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "351E5BCF-A56B-4D91-BA3C-21A4B77D529A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2DC2BBB4-171E-4EFF-A575-A5B7FF031755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6B0504-27C1-4824-A928-A878CBBAB32D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CE81AD36-ACD1-4C6C-8E7C-5326D1DA3045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks."
},
{
"lang": "es",
"value": "Apache Tomcat 6.0.0 hasta 6.0.13, 5.5.0 hasta 5.5.24, 5.0.0 hasta 5.0.30, 4.1.0 hasta 4.1.36, y 3.3 hasta 3.3.2 trata las comillas simples (\"\u0027\") como delimitadores en las cookies, lo cual podr\u00eda provocar que informaci\u00f3n sensible como los identificadores de sesi\u00f3n se filtre y permita a atacantes remotos llevar a cabo ataques de secuestro de sesi\u00f3n."
}
],
"id": "CVE-2007-3382",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-14T22:17:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"source": "secalert@redhat.com",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"source": "secalert@redhat.com",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26466"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26898"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27037"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27267"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27727"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28317"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28361"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/29242"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/30802"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/33668"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/36486"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1018556"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT2163"
},
{
"source": "secalert@redhat.com",
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1453"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/993544"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:241"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0950.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/476442/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/476466/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/25316"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/2902"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/3527"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/0233"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36006"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26898"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27267"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27727"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29242"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/33668"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36486"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1018556"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT2163"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1453"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/993544"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:241"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0950.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/476442/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/476466/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2902"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/3527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/0233"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-QFF8-G48J-PWPW
Vulnerability from github – Published: 2022-05-01 18:13 – Updated: 2023-09-22 21:05Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (') as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0"
},
{
"last_affected": "6.0.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "5.5.0"
},
{
"last_affected": "5.5.24"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0"
},
{
"last_affected": "5.0.30"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "4.1.0"
},
{
"last_affected": "4.1.36"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.tomcat:tomcat"
},
"ranges": [
{
"events": [
{
"introduced": "3.3.0"
},
{
"last_affected": "3.3.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2007-3382"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2023-09-22T21:05:30Z",
"nvd_published_at": "2007-08-14T22:17:00Z",
"severity": "MODERATE"
},
"details": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (`\u0027`) as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"id": "GHSA-qff8-g48j-pwpw",
"modified": "2023-09-22T21:05:30Z",
"published": "2022-05-01T18:13:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36006"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{
"type": "WEB",
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT2163"
},
{
"type": "WEB",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1453"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0950.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Apache Tomcat treats single quotes as delimiters in cookies"
}
GSD-2007-3382
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-3382",
"description": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"id": "GSD-2007-3382",
"references": [
"https://www.suse.com/security/cve/CVE-2007-3382.html",
"https://www.debian.org/security/2008/dsa-1453",
"https://www.debian.org/security/2008/dsa-1447",
"https://access.redhat.com/errata/RHSA-2010:0602",
"https://access.redhat.com/errata/RHSA-2008:0524",
"https://access.redhat.com/errata/RHSA-2008:0261",
"https://access.redhat.com/errata/RHSA-2008:0195",
"https://access.redhat.com/errata/RHSA-2007:1069",
"https://access.redhat.com/errata/RHSA-2007:0950",
"https://access.redhat.com/errata/RHSA-2007:0876",
"https://access.redhat.com/errata/RHSA-2007:0871",
"https://linux.oracle.com/cve/CVE-2007-3382.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-3382"
],
"details": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"id": "GSD-2007-3382",
"modified": "2023-12-13T01:21:42.250411Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-3382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-1453",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1453"
},
{
"name": "RHSA-2007:0950",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0950.html"
},
{
"name": "http://support.apple.com/kb/HT2163",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "20070814 Re: CVE-2007-3382: Handling of cookies containing a \u0027 character",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/476466/100/0/threaded"
},
{
"name": "ADV-2008-1981",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "FEDORA-2007-3456",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{
"name": "27267",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27267"
},
{
"name": "29242",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29242"
},
{
"name": "ADV-2007-3527",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3527"
},
{
"name": "1018556",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018556"
},
{
"name": "26466",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26466"
},
{
"name": "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{
"name": "SUSE-SR:2008:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name": "33668",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33668"
},
{
"name": "ADV-2007-2902",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2902"
},
{
"name": "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{
"name": "26898",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26898"
},
{
"name": "28361",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28361"
},
{
"name": "IZ55562",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562"
},
{
"name": "SSRT071472",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "28317",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28317"
},
{
"name": "APPLE-SA-2008-06-30",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "ADV-2009-0233",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0233"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "RHSA-2007:0871",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html"
},
{
"name": "ADV-2007-3386",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "30802",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30802"
},
{
"name": "RHSA-2008:0195",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "27037",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27037"
},
{
"name": "25316",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25316"
},
{
"name": "VU#993544",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/993544"
},
{
"name": "SSRT071447",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "27727",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27727"
},
{
"name": "HPSBUX02262",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "20070814 CVE-2007-3382: Handling of cookies containing a \u0027 character",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/476442/100/0/threaded"
},
{
"name": "RHSA-2008:0261",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"name": "36486",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36486"
},
{
"name": "HPSBTU02276",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "DSA-1447",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx",
"refsource": "CONFIRM",
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"name": "oval:org.mitre.oval:def:11269",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269"
},
{
"name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540",
"refsource": "CONFIRM",
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
},
{
"name": "tomcat-quotecookie-information-disclosure(36006)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36006"
},
{
"name": "MDKSA-2007:241",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:241"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-3382"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "VU#993544",
"refsource": "CERT-VN",
"tags": [
"Patch",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/993544"
},
{
"name": "FEDORA-2007-3456",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"
},
{
"name": "RHSA-2007:0871",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0871.html"
},
{
"name": "RHSA-2007:0950",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0950.html"
},
{
"name": "25316",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/25316"
},
{
"name": "1018556",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1018556"
},
{
"name": "26466",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26466"
},
{
"name": "26898",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26898"
},
{
"name": "27037",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27037"
},
{
"name": "27267",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27267"
},
{
"name": "27727",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27727"
},
{
"name": "DSA-1447",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1447"
},
{
"name": "DSA-1453",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1453"
},
{
"name": "MDKSA-2007:241",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:241"
},
{
"name": "28317",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28317"
},
{
"name": "28361",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28361"
},
{
"name": "SUSE-SR:2008:005",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"
},
{
"name": "29242",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/29242"
},
{
"name": "RHSA-2008:0195",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html"
},
{
"name": "RHSA-2008:0261",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"name": "http://support.apple.com/kb/HT2163",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "30802",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30802"
},
{
"name": "APPLE-SA-2008-06-30",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx",
"refsource": "CONFIRM",
"tags": [],
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"
},
{
"name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"
},
{
"name": "33668",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/33668"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "36486",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36486"
},
{
"name": "IZ55562",
"refsource": "AIXAPAR",
"tags": [],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562"
},
{
"name": "SSRT071447",
"refsource": "HP",
"tags": [],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
},
{
"name": "ADV-2009-0233",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/0233"
},
{
"name": "ADV-2007-3386",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/3386"
},
{
"name": "ADV-2007-3527",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/3527"
},
{
"name": "ADV-2008-1981",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "SSRT071472",
"refsource": "HP",
"tags": [],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554"
},
{
"name": "ADV-2007-2902",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/2902"
},
{
"name": "tomcat-quotecookie-information-disclosure(36006)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36006"
},
{
"name": "oval:org.mitre.oval:def:11269",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269"
},
{
"name": "20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/500412/100/0/threaded"
},
{
"name": "20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/500396/100/0/threaded"
},
{
"name": "20070814 Re: CVE-2007-3382: Handling of cookies containing a \u0027 character",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/476466/100/0/threaded"
},
{
"name": "20070814 CVE-2007-3382: Handling of cookies containing a \u0027 character",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/476442/100/0/threaded"
},
{
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"
},
{
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2019-03-25T11:29Z",
"publishedDate": "2007-08-14T22:17Z"
}
}
}
RHSA-2007:0871
Vulnerability from csaf_redhat - Published: 2007-09-26 08:27 - Updated: 2025-11-21 17:32Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tomcat packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5. \n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Tomcat is a servlet container for Java Servlet and Java Server Pages\ntechnologies.\n\nTomcat was found treating single quote characters -- \u0027 -- as delimiters in\ncookies. This could allow remote attackers to obtain sensitive information,\nsuch as session IDs, for session hijacking attacks (CVE-2007-3382).\n\nIt was reported Tomcat did not properly handle the following character\nsequence in a cookie: \\\" (a backslash followed by a double-quote). It was\npossible remote attackers could use this failure to obtain sensitive\ninformation, such as session IDs, for session hijacking attacks\n(CVE-2007-3385).\n\nA cross-site scripting (XSS) vulnerability existed in the Host Manager\nServlet. This allowed remote attackers to inject arbitrary HTML and web\nscript via crafted requests (CVE-2007-3386).\n\nUsers of Tomcat should update to these erratum packages, which contain\nbackported patches and are not vulnerable to these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0871",
"url": "https://access.redhat.com/errata/RHSA-2007:0871"
},
{
"category": "external",
"summary": "247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://tomcat.apache.org/security-5.html",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"category": "external",
"summary": "247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "247994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247994"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0871.json"
}
],
"title": "Red Hat Security Advisory: tomcat security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:12+00:00",
"generator": {
"date": "2025-11-21T17:32:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0871",
"initial_release_date": "2007-09-26T08:27:00+00:00",
"revision_history": [
{
"date": "2007-09-26T08:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-09-26T04:27:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.2.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.2.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.2.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.2.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.2.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.2.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.2.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.3.0.2.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
},
"product_reference": "tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3382",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247972"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookies",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3382"
},
{
"category": "external",
"summary": "RHBZ#247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-26T08:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0871"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookies"
},
{
"cve": "CVE-2007-3385",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247976"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookie values",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3385"
},
{
"category": "external",
"summary": "RHBZ#247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-26T08:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0871"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookie values"
},
{
"cve": "CVE-2007-3386",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247994"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat host manager xss",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3386"
},
{
"category": "external",
"summary": "RHBZ#247994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3386",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3386"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-26T08:27:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client-Workstation:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client-Workstation:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Client:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Client:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.src",
"5Server:tomcat5-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-admin-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-common-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.ppc64",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-debuginfo-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jasper-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-server-lib-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.3.0.2.el5.x86_64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.i386",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ia64",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.ppc",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.s390x",
"5Server:tomcat5-webapps-0:5.5.23-0jpp.3.0.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0871"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat host manager xss"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.