Vulnerability Name:

CVE-2011-4858 (CCN-72016)

Assigned:2011-12-28
Published:2011-12-28
Updated:2018-01-09
Summary:Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.1 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.1 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-399
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2011-4858

Source: CCN
Type: Apache Geronimo Web site
Fixed in Geronimo 2.1.8

Source: CCN
Type: HP Security Bulletin HPSBUX02741 SSRT100728 rev.1
HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass

Source: CCN
Type: HP Security Bulletin HPSBMU02747 SSRT100771 rev.1
HP OpenView Network Node Manager (OV NNM) Running Apache Tomcat, Remote Denial of Service (DoS)

Source: MLIST
Type: UNKNOWN
[announce] 20111228 [SECURITY] Apache Tomcat and the hashtable collision DoS vulnerability

Source: HP
Type: UNKNOWN
SSRT100728

Source: HP
Type: UNKNOWN
SSRT100771

Source: HP
Type: UNKNOWN
HPSBUX02860

Source: CCN
Type: RHSA-2012-0074
Important: jbossweb security update

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0074

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0075

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0076

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0077

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0078

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0089

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0325

Source: REDHAT
Type: UNKNOWN
RHSA-2012:0406

Source: CCN
Type: RHSA-2012-0474
Moderate: tomcat5 security update

Source: CCN
Type: RHSA-2012-0475
Moderate: tomcat6 security update

Source: CCN
Type: RHSA-2012-0679
Moderate: tomcat5 security and bug fix update

Source: CCN
Type: RHSA-2012-0680
Moderate: tomcat5 security and bug fix update

Source: CCN
Type: RHSA-2012-0681
Moderate: tomcat6 security and bug fix update

Source: CCN
Type: RHSA-2012-0682
Moderate: tomcat6 security and bug fix update

Source: CCN
Type: SA47379
Apache Geronimo Multiple Vulnerabilities

Source: CCN
Type: SA47411
Apache Tomcat Web Form Hash Collision Denial of Service Vulnerability

Source: CCN
Type: SA47473
IBM WebSphere Application Server Community Edition Tomcat Container Denial of Service

Source: CCN
Type: SA47604
Hitachi Cosminexus Products Hash Collision Denial of Service Vulnerability

Source: CCN
Type: SA47903
HP-UX Apache Web Server Suite Multiple Denial of Service Vulnerabilities

Source: CCN
Type: SA48549
HP OpenView Network Node Manager Apache Tomcat Two Denial of Service Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
48549

Source: SECUNIA
Type: UNKNOWN
48790

Source: SECUNIA
Type: UNKNOWN
48791

Source: CCN
Type: SA49829
Hitachi IT Operations Analyzer Hash Collision Denial of Service Vulnerability

Source: CCN
Type: SA54255
HP Network Node Manager i (NNMi) Multiple Vulnerabilities

Source: CCN
Type: SA54971
IBM Tivoli Integrated Portal Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
54971

Source: CCN
Type: SA55115
IBM Tivoli Dynamic Workload Console Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
55115

Source: CCN
Type: Apache Tomcat Web site
Apache Tomcat

Source: CONFIRM
Type: UNKNOWN
http://tomcat.apache.org/tomcat-7.0-doc/changelog.html

Source: CCN
Type: IBM Security Bulletin 1577274
Denial of service vulnerability in the web container of WebSphere Application Server Community Edition

Source: CCN
Type: IBM Security Bulletin 1626697
Multiple vulnerabilities in IBM Cognos BI 8.4.1,10.1, 10.1.1 and 10.2 (CVE-2011-3026, CVE-2011-4858, CVE-2012-0498, CVE-2012-2177, CVE-2012-2193, CVE-2012-4835, CVE-2012-4836, CVE-2012-4837, CVE-2012-4840, CVE-2012-4858, CVE-2012-5081)

Source: CCN
Type: IBM Security Bulletin 1642791
IBM WebSphere Appliance Management Center, multiple security vulnerabilities in IBM Tivoli Integrated Portal

Source: CCN
Type: IBM Security Bulletin 1646292
Tivoli Business Service Manager - Websphere Potential security exposure(CVE-2012-3325) and Apache Tomcat hash denial of service (CVE-2011-4858)

Source: CCN
Type: IBM Security Bulletin 1646446
Security Vulnerabilities addressed in IBM Tivoli Netcool Performance Manager (CVE-2013-0464, CVE-2012-3325, CVE-2012-3325)

Source: CCN
Type: IBM Security Bulletin 1646503
Tivoli Storage Productivity Center, multiple security vulnerabilities in IBM Tivoli Integrated Portal (CVE-2013-0464, CVE-2012-3325, CVE-2011-4858)

Source: CCN
Type: IBM Security Bulletin 1651284
Tivoli Workload Dynamic Console Vulnerability exposure in Tivoli Integrated Portal component

Source: CCN
Type: IBM Security Bulletin 1654075
Tivoli Netcool/OMNIbus Web GUI - IBM WebSphere Application Server PM44303 security bypass (CVE-2012-3325) and Hash denial of service (CVE-2011-4858)

Source: DEBIAN
Type: UNKNOWN
DSA-2401

Source: DEBIAN
Type: DSA-2401
tomcat6 -- several vulnerabilities

Source: CCN
Type: Hitachi Security Vulnerability Information HS12-003
DoS Vulnerability in Cosminexus

Source: CCN
Type: Hitachi Security Vulnerability Information HS12-019
Hitachi IT Operations Analyzer

Source: CCN
Type: IBM Security Bulletin 1575700
A Tomcat fix for WebSphere Application Server Community Edition v3.0.0.0

Source: CCN
Type: IBM Security Bulletin 1675356
IBM Security SiteProtector System can be affected by a vulnerability in Geronimo (CVE-2011-4858)

Source: CCN
Type: US-CERT VU#903934
Hash table implementations vulnerable to algorithmic complexity attacks

Source: CERT-VN
Type: US Government Resource
VU#903934

Source: CCN
Type: n.runs-SA-2011.004
Denial of Service through hash table multi-collisions

Source: MISC
Type: UNKNOWN
http://www.nruns.com/_downloads/advisory28122011.pdf

Source: CCN
Type: oCERT-2011-003
multiple implementations denial-of-service via hash algorithm collision

Source: MISC
Type: UNKNOWN
http://www.ocert.org/advisories/ocert-2011-003.html

Source: CCN
Type: OSVDB ID: 78214
IBM WebSphere Application Server Community Edition Tomcat Container Multiple Parameter Request Parsing Remote DoS

Source: CCN
Type: OSVDB ID: 78483
Hitachi Cosminexus Multiple Product Hash Collision Form Parameter Parsing Remote DoS

Source: CCN
Type: OSVDB ID: 78573
Apache Tomcat CPU Consumption Parameter Saturation Remote DoS

Source: BID
Type: UNKNOWN
51200

Source: CCN
Type: BID-51200
Apache Tomcat Hash Collision Denial Of Service Vulnerability

Source: CCN
Type: BID-51345
IBM WebSphere Application Server Community Edition Tomcat Container Denial Of Service Vulnerability

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=750521

Source: XF
Type: UNKNOWN
apache-tomcat-hash-dos(72016)

Source: MISC
Type: UNKNOWN
https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py

Source: CCN
Type: HP Security Bulletin HPSBMU02894 rev.1
HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Denial of Service (DoS), Unauthorized Access, Execution of Arbitrary Code

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:18886

Source: CCN
Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator)
Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:tomcat:5.5.35:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.34:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:tomcat:5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7:*:*:*:*:*:*:*
  • AND
  • cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_application_server:5:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_application_server:6:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_architect:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • OR cpe:/a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_service_platform:*:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:cosminexus_developer:6:-:pro:*:*:*:*:*
  • OR cpe:/a:hitachi:ucosminexus_developer:6:-:pro:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*
  • OR cpe:/a:hp:network_node_manager_i:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:hitachi:it_operations_analyzer:02-01:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:geronimo:2.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_business_service_manager:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20114858
    V
    CVE-2011-4858
    2022-05-20
    oval:org.mitre.oval:def:18886
    V
    HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass, Unauthorized Modification and Other Vulnerabilities
    2015-04-20
    oval:org.mitre.oval:def:15018
    P
    USN-1359-1 -- Tomcat vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:15309
    P
    DSA-2401-1 tomcat6 -- several
    2014-06-23
    oval:org.mitre.oval:def:23331
    P
    ELSA-2012:0474: tomcat5 security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:23745
    P
    ELSA-2012:0475: tomcat6 security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:21412
    P
    RHSA-2012:0474: tomcat5 security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:21312
    P
    RHSA-2012:0475: tomcat6 security update (Moderate)
    2014-02-24
    oval:com.redhat.rhsa:def:20120474
    P
    RHSA-2012:0474: tomcat5 security update (Moderate)
    2012-04-11
    oval:com.redhat.rhsa:def:20120475
    P
    RHSA-2012:0475: tomcat6 security update (Moderate)
    2012-04-11
    oval:com.ubuntu.precise:def:20114858000
    V
    CVE-2011-4858 on Ubuntu 12.04 LTS (precise) - medium.
    2012-01-05
    BACK
    apache tomcat 5.5.35
    apache tomcat 6.0.0
    apache tomcat 6.0.1
    apache tomcat 6.0.2
    apache tomcat 6.0.3
    apache tomcat 6.0.4
    apache tomcat 6.0.5
    apache tomcat 6.0.6
    apache tomcat 6.0.7
    apache tomcat 6.0.8
    apache tomcat 6.0.9
    apache tomcat 6.0.10
    apache tomcat 6.0.11
    apache tomcat 6.0.12
    apache tomcat 6.0.13
    apache tomcat 6.0.14
    apache tomcat 6.0.15
    apache tomcat 6.0.16
    apache tomcat 6.0.17
    apache tomcat 6.0.18
    apache tomcat 6.0.19
    apache tomcat 6.0.20
    apache tomcat 6.0.21
    apache tomcat 6.0.22
    apache tomcat 6.0.23
    apache tomcat 6.0.24
    apache tomcat 6.0.25
    apache tomcat 6.0.26
    apache tomcat 6.0.27
    apache tomcat 6.0.28
    apache tomcat 6.0.29
    apache tomcat 6.0.30
    apache tomcat 6.0.31
    apache tomcat 6.0.32
    apache tomcat 6.0.33
    apache tomcat 6.0.34
    apache tomcat 7.0.0
    apache tomcat 7.0.1
    apache tomcat 7.0.2
    apache tomcat 7.0.3
    apache tomcat 7.0.4
    apache tomcat 7.0.5
    apache tomcat 7.0.6
    apache tomcat 7.0.7
    apache tomcat 7.0.8
    apache tomcat 7.0.9
    apache tomcat 7.0.10
    apache tomcat 7.0.11
    apache tomcat 7.0.12
    apache tomcat 7.0.13
    apache tomcat 7.0.14
    apache tomcat 7.0.15
    apache tomcat 7.0.16
    apache tomcat 7.0.17
    apache tomcat 7.0.18
    apache tomcat 7.0.19
    apache tomcat 7.0.20
    apache tomcat 7.0.21
    apache tomcat 7.0.22
    apache tomcat 5
    apache tomcat 6
    apache tomcat 7
    hp hp-ux b.11.23
    hitachi cosminexus application server 5
    hitachi cosminexus application server 6
    hitachi ucosminexus service architect *
    redhat enterprise linux 5
    redhat enterprise linux 5
    hp hp-ux b.11.31
    apache geronimo 2.1
    redhat enterprise linux 5
    hp openview network node manager 7.0.1
    apache geronimo 2.1.1
    apache geronimo 2.1.2
    apache geronimo 2.1.3
    hitachi ucosminexus service platform *
    hitachi cosminexus developer 6 -
    hitachi ucosminexus developer 6 -
    ibm cognos business intelligence 8.4.1
    redhat enterprise linux 6
    redhat enterprise linux 6
    hp network node manager i 9.0
    hitachi it operations analyzer 02-01
    apache geronimo 2.1.8
    apache geronimo 2.1.7
    apache geronimo 2.1.6
    apache geronimo 2.1.5
    apache geronimo 2.1.4
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6
    ibm cognos business intelligence 10.1
    ibm cognos business intelligence 10.1.1
    ibm cognos business intelligence 10.2
    ibm tivoli business service manager 4.2.1
    ibm sterling b2b integrator 6.0.0.0
    ibm sterling b2b integrator 5.2.0.0