Vulnerability Name: CVE-2013-4322 (CCN-91625) Assigned: 2013-06-12 Published: 2014-02-25 Updated: 2019-04-15 Summary: Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. Note : this vulnerability exists because of an incomplete fix for CVE-2012-3544 . CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P )3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P )3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-20 Vulnerability Consequences: Denial of Service References: Source: CONFIRM Type: UNKNOWNhttp://advisories.mageia.org/MGASA-2014-0148.html Source: MITRE Type: CNACVE-2013-4322 Source: HP Type: UNKNOWNHPSBOV03503 Source: CCN Type: RHSA-2014-0429Moderate: tomcat6 security update Source: CCN Type: RHSA-2014-0525Moderate: Red Hat JBoss Web Server 2.0.1 tomcat6 security update Source: CCN Type: RHSA-2014-0526Moderate: Red Hat JBoss Web Server 2.0.1 tomcat7 security update Source: CCN Type: RHSA-2014-0686Important: tomcat security update Source: FULLDISC Type: UNKNOWN20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities Source: CCN Type: SA58020IBM Security AppScan Apache Tomcat Session Fixation Vulnerability Source: CCN Type: SA58152IBM Rational Policy Tester Apache Tomcat Session Fixation Vulnerability Source: SECUNIA Type: UNKNOWN59036 Source: SECUNIA Type: UNKNOWN59675 Source: SECUNIA Type: UNKNOWN59722 Source: SECUNIA Type: UNKNOWN59724 Source: SECUNIA Type: UNKNOWN59873 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1521834 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1521864 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1549522 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1549523 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1556540 Source: CONFIRM Type: Vendor Advisoryhttp://tomcat.apache.org/security-6.html Source: CCN Type: Apache Web siteFixed in Apache Tomcat 6.0.39 Source: CONFIRM Type: Vendor Advisoryhttp://tomcat.apache.org/security-7.html Source: CONFIRM Type: Vendor Advisoryhttp://tomcat.apache.org/security-8.html Source: CONFIRM Type: UNKNOWNhttp://www-01.ibm.com/support/docview.wss?uid=swg21667883 Source: CCN Type: IBM Security Bulletin 1670941IBM Security AppScan Enterprise can be affected by multiple vulnerabilities in Apache Tomcat (CVE-2014-0033, CVE-2013-4322) Source: CCN Type: IBM Security Bulletin 1670942IBM Rational Policy Tester can be affected by multiple vulnerabilities in Apache Tomcat (CVE-2014-0033, CVE-2013-4322) Source: CONFIRM Type: UNKNOWNhttp://www-01.ibm.com/support/docview.wss?uid=swg21675886 Source: CONFIRM Type: UNKNOWNhttp://www-01.ibm.com/support/docview.wss?uid=swg21677147 Source: CONFIRM Type: UNKNOWNhttp://www-01.ibm.com/support/docview.wss?uid=swg21678113 Source: CONFIRM Type: UNKNOWNhttp://www-01.ibm.com/support/docview.wss?uid=swg21678231 Source: DEBIAN Type: UNKNOWNDSA-3530 Source: CCN Type: IBM Security Bulletin 1667883Rational Test Control Panel in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerablity (CVE-2013-4286, CVE-2013-4322, CVE-2013-4590) Source: CCN Type: IBM Security Bulletin 1669383Apache Tomcat and FileUpload Vulnerabilities in IBM UrbanCode Deploy (CVE-2014-0050, CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590) Source: CCN Type: IBM Security Bulletin 1671330Multiple Vulnerabilities in Apache Tomcat (CVE-2013-4286, CVE-2013-4322, CVE-2014-0050) Source: CCN Type: IBM Security Bulletin 1671340Multiple security exposures in IBM Cognos BI Server (CVE-2014- 0416, CVE-2014-0423, CVE-2013-4322) Source: CCN Type: IBM Security Bulletin 1671862IBM Initiate Master Data Service is affected by vulnerabilities in Apache Tomcat (CVE-2013-4286, CVE-2014-0033, CVE-2013-4322) Source: CCN Type: IBM Security Bulletin 1671934Multiple security exposures in IBM Cognos Business Viewpoint (CVE-2014- 0411, CVE-2013-4286, CVE-2013-4322) Source: CCN Type: IBM Security Bulletin 1672321Apache Tomcat and FileUpload Vulnerabilities in IBM UrbanCode Release (CVE-2014-0050, CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590) Source: CCN Type: IBM Security Bulletin 1673072Rational Directory Server could be affected by vulnerabilities in Apache Tomcat server (CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, and CVE-2013-4590) Source: CCN Type: IBM Security Bulletin 1675006Multiple Apache Tomcat vulnerabilities in IBM Algo Audit and Compliance (CVE-2013-4286, CVE-2013-4322, CVE-2013-4590, CVE-2014-0033) Source: CCN Type: IBM Security Bulletin 1675886IBM Rational Connector for SAP Solution Manager (CVE-2013-4286 CVE-2014-0033 CVE-2013-4322 CVE-2013-4590) Source: CCN Type: IBM Security Bulletin 1676186Security vulnerabilities in Apache Tomcat affects multiple IBM Rational products based on IBM's Jazz technology (CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590) Source: CCN Type: IBM Security Bulletin 1676983Security vulnerabilities in Apache Tomcat in Rational DOORS Web Access Source: CCN Type: IBM Security Bulletin 1677147Multiple vulnerabilities in Apache Tomcat used by IBM QRadar Security Information and Event Manager 7.1 MR2, and 7.2 MR2. (CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590) Source: CCN Type: IBM Security Bulletin 1677448IBM OpenPages GRC Platform, multiple vulnerabilities in bundled version of Apache Tomcat Source: CCN Type: IBM Security Bulletin 1678113Multiple vulnerabilities exist in IMS Enterprise Suite SOAP Gateway (CVE-2014-0453, CVE-2013-4286, CVE-2013-4322) Source: CCN Type: IBM Security Bulletin 1678231Rational Lifecycle Adapter for HP ALM Apache Tomcat fix (CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1678892Tivoli Application Dependency Discovery Manager - Open Source Tomcat issues reported between March - May 2014. Source: CCN Type: IBM Security Bulletin 1680754Security vulnerabilities in Apache Tomcat for WebSphere Application Server Community Edition 2.1.1.6 and 3.0.0.4(CVE-2013-4286,CVE-2012-3544,CVE-2013-4322,CVE-2013-4590,CVE-2014-0033) Source: CCN Type: IBM Security Bulletin 1682399IBM Cognos TM1 is affected by the following Tomcat vulnerability: CVE-2013-4322 Source: CCN Type: IBM Security Bulletin 1687629IBM Cognos Express is affected by the following Tomcat vulnerability: CVE-2013-4322 Source: CCN Type: IBM Security Bulletin 1687761 IBM Algo One is affected by multiple Open Source Tomcat security vulnerabilities (CVE-2013-4444, CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590) Source: MANDRIVA Type: UNKNOWNMDVSA-2015:052 Source: MANDRIVA Type: UNKNOWNMDVSA-2015:084 Source: CCN Type: Oracle CPUOct2016Oracle Critical Patch Update Advisory - October 2016 Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html Source: BUGTRAQ Type: UNKNOWN20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities Source: BID Type: UNKNOWN65767 Source: CCN Type: BID-65767Apache Tomcat CVE-2013-4322 Incomplete Fix Denial of Service Vulnerability Source: UBUNTU Type: UNKNOWNUSN-2130-1 Source: CONFIRM Type: UNKNOWNhttp://www.vmware.com/security/advisories/VMSA-2014-0008.html Source: CONFIRM Type: UNKNOWNhttp://www.vmware.com/security/advisories/VMSA-2014-0012.html Source: CCN Type: Red Hat Bugzilla Bug 1069905CVE-2013-4322 tomcat: incomplete fix for CVE-2012-3544 Source: CONFIRM Type: UNKNOWNhttps://bugzilla.redhat.com/show_bug.cgi?id=1069905 Source: XF Type: UNKNOWNapache-tomcat-cve20134322-dos(91625) Source: CONFIRM Type: UNKNOWNhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013 Source: MLIST Type: UNKNOWN[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/ Source: REDHAT Type: UNKNOWNRHSA-2014:0686 Source: CCN Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator)Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector)IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6858013 (Tivoli Application Dependency Discovery Manager)TADDM affected by multiple vulnerabilities due to Apache Tomcat libraries Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2013-4322 Vulnerable Configuration: Configuration 1 :cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:* Configuration 2 :cpe:/a:apache:tomcat:1.1.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.1.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.3.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.3.1a:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.3.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.3:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.9:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.34:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version <= 6.0.37) Configuration 3 :cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc4:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc6:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc7:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc8:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc9:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration RedHat 10 :cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:tomcat:3.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.1.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.3.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.3.1a:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:3.3.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.3:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.9:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4.1.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:1.1.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.34:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:5.5.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc4:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc6:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc7:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc8:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc9:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* AND cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_express:9.5:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:8.5:*:*:*:enterprise:*:*:* OR cpe:/a:ibm:rational_policy_tester:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.2:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:8.6:*:*:*:enterprise:*:*:* OR cpe:/a:ibm:websphere_message_broker:7.0:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_message_broker:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_express:10.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.2.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:8.7.0.0:-:enterprise:*:*:*:*:* OR cpe:/a:ibm:cognos_tm1:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_express:10.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:8.6:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:8.7:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:8.8:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:9.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:8.8:*:*:*:enterprise:*:*:* OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:ims_enterprise_suite:2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_audit_and_compliance:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_viewpoint:10.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_viewpoint:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:initiate_master_data_service:10.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:initiate_master_data_service:10.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:security_appscan:9.0:*:*:*:enterprise:*:*:* OR cpe:/a:ibm:ims_enterprise_suite:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_connector:4:*:*:*:sap_solution_manager:*:*:* OR cpe:/a:ibm:openpages_grc_platform:6.0.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:openpages_grc_platform:6.1.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.4.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.4.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.6.0.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
apache tomcat 7.0.0
apache tomcat 7.0.0 beta
apache tomcat 7.0.1
apache tomcat 7.0.2
apache tomcat 7.0.2 beta
apache tomcat 7.0.3
apache tomcat 7.0.4
apache tomcat 7.0.4 beta
apache tomcat 7.0.10
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.13
apache tomcat 7.0.14
apache tomcat 7.0.15
apache tomcat 7.0.16
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.19
apache tomcat 7.0.20
apache tomcat 7.0.21
apache tomcat 7.0.22
apache tomcat 7.0.23
apache tomcat 7.0.24
apache tomcat 7.0.25
apache tomcat 7.0.26
apache tomcat 7.0.27
apache tomcat 7.0.28
apache tomcat 7.0.29
apache tomcat 7.0.30
apache tomcat 7.0.31
apache tomcat 7.0.32
apache tomcat 7.0.33
apache tomcat 7.0.34
apache tomcat 7.0.35
apache tomcat 7.0.36
apache tomcat 7.0.37
apache tomcat 7.0.38
apache tomcat 7.0.39
apache tomcat 7.0.40
apache tomcat 7.0.41
apache tomcat 7.0.42
apache tomcat 7.0.43
apache tomcat 7.0.44
apache tomcat 7.0.45
apache tomcat 7.0.46
apache tomcat 7.0.50
apache tomcat 1.1.3
apache tomcat 3.0
apache tomcat 3.1
apache tomcat 3.1.1
apache tomcat 3.2
apache tomcat 3.2.1
apache tomcat 3.2.2
apache tomcat 3.2.2 beta2
apache tomcat 3.2.3
apache tomcat 3.2.4
apache tomcat 3.3
apache tomcat 3.3.1
apache tomcat 3.3.1a
apache tomcat 3.3.2
apache tomcat 4
apache tomcat 4.0.0
apache tomcat 4.0.1
apache tomcat 4.0.2
apache tomcat 4.0.3
apache tomcat 4.0.4
apache tomcat 4.0.5
apache tomcat 4.0.6
apache tomcat 4.1.0
apache tomcat 4.1.1
apache tomcat 4.1.2
apache tomcat 4.1.3
apache tomcat 4.1.3 beta
apache tomcat 4.1.9 beta
apache tomcat 4.1.10
apache tomcat 4.1.12
apache tomcat 4.1.15
apache tomcat 4.1.24
apache tomcat 4.1.28
apache tomcat 4.1.29
apache tomcat 4.1.31
apache tomcat 4.1.36
apache tomcat 5
apache tomcat 5.0.0
apache tomcat 5.0.1
apache tomcat 5.0.2
apache tomcat 5.0.3
apache tomcat 5.0.4
apache tomcat 5.0.5
apache tomcat 5.0.6
apache tomcat 5.0.7
apache tomcat 5.0.8
apache tomcat 5.0.9
apache tomcat 5.0.10
apache tomcat 5.0.11
apache tomcat 5.0.12
apache tomcat 5.0.13
apache tomcat 5.0.14
apache tomcat 5.0.15
apache tomcat 5.0.16
apache tomcat 5.0.17
apache tomcat 5.0.18
apache tomcat 5.0.19
apache tomcat 5.0.21
apache tomcat 5.0.22
apache tomcat 5.0.23
apache tomcat 5.0.24
apache tomcat 5.0.25
apache tomcat 5.0.26
apache tomcat 5.0.27
apache tomcat 5.0.28
apache tomcat 5.0.29
apache tomcat 5.0.30
apache tomcat 5.5.0
apache tomcat 5.5.1
apache tomcat 5.5.2
apache tomcat 5.5.3
apache tomcat 5.5.4
apache tomcat 5.5.5
apache tomcat 5.5.6
apache tomcat 5.5.7
apache tomcat 5.5.8
apache tomcat 5.5.9
apache tomcat 5.5.10
apache tomcat 5.5.11
apache tomcat 5.5.12
apache tomcat 5.5.13
apache tomcat 5.5.14
apache tomcat 5.5.15
apache tomcat 5.5.16
apache tomcat 5.5.17
apache tomcat 5.5.18
apache tomcat 5.5.19
apache tomcat 5.5.20
apache tomcat 5.5.21
apache tomcat 5.5.22
apache tomcat 5.5.23
apache tomcat 5.5.24
apache tomcat 5.5.25
apache tomcat 5.5.26
apache tomcat 5.5.27
apache tomcat 5.5.28
apache tomcat 5.5.29
apache tomcat 5.5.30
apache tomcat 5.5.31
apache tomcat 5.5.32
apache tomcat 5.5.33
apache tomcat 5.5.34
apache tomcat 5.5.35
apache tomcat 6
apache tomcat 6.0
apache tomcat 6.0.0
apache tomcat 6.0.0 alpha
apache tomcat 6.0.1
apache tomcat 6.0.1 alpha
apache tomcat 6.0.2
apache tomcat 6.0.2 alpha
apache tomcat 6.0.2 beta
apache tomcat 6.0.3
apache tomcat 6.0.10
apache tomcat 6.0.11
apache tomcat 6.0.12
apache tomcat 6.0.13
apache tomcat 6.0.14
apache tomcat 6.0.15
apache tomcat 6.0.16
apache tomcat 6.0.17
apache tomcat 6.0.18
apache tomcat 6.0.19
apache tomcat 6.0.20
apache tomcat 6.0.24
apache tomcat 6.0.26
apache tomcat 6.0.27
apache tomcat 6.0.28
apache tomcat 6.0.29
apache tomcat 6.0.30
apache tomcat 6.0.31
apache tomcat 6.0.32
apache tomcat 6.0.33
apache tomcat 6.0.35
apache tomcat 6.0.36
apache tomcat *
apache tomcat 8.0.0 rc1
apache tomcat 8.0.0 rc2
apache tomcat 8.0.0 rc3
apache tomcat 8.0.0 rc4
apache tomcat 8.0.0 rc5
apache tomcat 8.0.0 rc6
apache tomcat 8.0.0 rc7
apache tomcat 8.0.0 rc8
apache tomcat 8.0.0 rc9
apache tomcat 3.1
apache tomcat 3.0
apache tomcat 3.2.1
apache tomcat 4.0.1
apache tomcat 3.2.3
apache tomcat 3.2.4
apache tomcat 4.0.3
apache tomcat 4.0.4
apache tomcat 4.1.10
apache tomcat 3.3
apache tomcat 4.1.0
apache tomcat 5.5.4
apache tomcat 5.0.19
apache tomcat 4.1.24
apache tomcat 5.0.28
apache tomcat 5.5.12
apache tomcat 5.5.9
apache tomcat 5.5.7
apache tomcat 5.5.20
apache tomcat 5.0.25
apache tomcat 5.5.17
apache tomcat 5.0.0
apache tomcat 3.1.1
apache tomcat 3.2
apache tomcat 3.2.2
apache tomcat 3.2.2 beta2
apache tomcat 3.3.1
apache tomcat 3.3.1a
apache tomcat 3.3.2
apache tomcat 4.0.0
apache tomcat 4.0.2
apache tomcat 4.0.5
apache tomcat 4.0.6
apache tomcat 4.1.1
apache tomcat 4.1.12
apache tomcat 4.1.15
apache tomcat 4.1.2
apache tomcat 4.1.28
apache tomcat 4.1.3
apache tomcat 4.1.3 beta
apache tomcat 4.1.31
apache tomcat 4.1.36
apache tomcat 4.1.9 beta
apache tomcat 5.0.1
apache tomcat 5.0.10
apache tomcat 5.0.11
apache tomcat 5.0.12
apache tomcat 5.0.13
apache tomcat 5.0.14
apache tomcat 5.0.15
apache tomcat 5.0.16
apache tomcat 5.0.17
apache tomcat 5.0.18
apache tomcat 5.0.2
apache tomcat 5.0.21
apache tomcat 5.0.22
apache tomcat 5.0.23
apache tomcat 5.0.24
apache tomcat 5.0.26
apache tomcat 5.0.27
apache tomcat 5.0.29
apache tomcat 5.0.3
apache tomcat 5.0.30
apache tomcat 5.0.4
apache tomcat 5.0.5
apache tomcat 5.0.6
apache tomcat 5.0.7
apache tomcat 5.0.8
apache tomcat 5.0.9
apache tomcat 5.5.0
apache tomcat 5.5.1
apache tomcat 5.5.10
apache tomcat 5.5.11
apache tomcat 5.5.13
apache tomcat 5.5.14
apache tomcat 5.5.15
apache tomcat 5.5.16
apache tomcat 5.5.18
apache tomcat 5.5.19
apache tomcat 5.5.2
apache tomcat 5.5.21
apache tomcat 5.5.22
apache tomcat 5.5.23
apache tomcat 5.5.24
apache tomcat 5.5.25
apache tomcat 5.5.3
apache tomcat 5.5.5
apache tomcat 5.5.6
apache tomcat 5.5.8
apache tomcat 6.0
apache tomcat 6.0.0
apache tomcat 6.0.1
apache tomcat 6.0.10
apache tomcat 6.0.11
apache tomcat 6.0.12
apache tomcat 6.0.13
apache tomcat 6.0.14
apache tomcat 6.0.15
apache tomcat 6.0.2
apache tomcat 6.0.3
apache tomcat 5.5.26
apache tomcat 6.0.16
apache tomcat 4.1.29
apache tomcat 5.5.27
apache tomcat 6.0.18
apache tomcat 6.0.17
apache tomcat 5.5.28
apache tomcat 6.0.20
apache tomcat 6.0.19
apache tomcat 5
apache tomcat 6
apache tomcat 6.0.24
apache tomcat 6.0.26
apache tomcat 6.0.27
apache tomcat 6.0.28
apache tomcat 6.0.29
apache tomcat 7.0.0 beta
apache tomcat 7.0.1
apache tomcat 7.0.2
apache tomcat 7.0.3
apache tomcat 7.0.4
apache tomcat 7.0.10
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.13
apache tomcat 5.5.29
apache tomcat 5.5.30
apache tomcat 5.5.31
apache tomcat 5.5.32
apache tomcat 5.5.33
apache tomcat 6.0.30
apache tomcat 6.0.31
apache tomcat 6.0.32
apache tomcat 7.0.16
apache tomcat 7.0.21
apache tomcat 6.0.33
apache tomcat 7.0.0
apache tomcat 1.1.3
apache tomcat 4
apache tomcat 5.5.34
apache tomcat 6.0.0 alpha
apache tomcat 6.0.1 alpha
apache tomcat 6.0.2 alpha
apache tomcat 6.0.2 beta
apache tomcat 7.0.14
apache tomcat 7.0.15
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.19
apache tomcat 7.0.2 beta
apache tomcat 7.0.20
apache tomcat 7.0.22
apache tomcat 7.0.23
apache tomcat 7.0.25
apache tomcat 7.0.4 beta
apache tomcat 5.5.35
apache tomcat 6.0.35
apache tomcat 7.0.28
apache tomcat 6.0.36
apache tomcat 7.0.50
apache tomcat 7.0.46
apache tomcat 7.0.45
apache tomcat 7.0.44
apache tomcat 7.0.43
apache tomcat 7.0.42
apache tomcat 7.0.41
apache tomcat 7.0.40
apache tomcat 7.0.39
apache tomcat 7.0.38
apache tomcat 7.0.37
apache tomcat 7.0.36
apache tomcat 7.0.35
apache tomcat 7.0.34
apache tomcat 7.0.33
apache tomcat 7.0.32
apache tomcat 7.0.31
apache tomcat 7.0.30
apache tomcat 7.0.29
apache tomcat 7.0.27
apache tomcat 7.0.26
apache tomcat 7.0.24
apache tomcat 6.0.37
apache tomcat 8.0.0 rc3
apache tomcat 8.0.0 rc4
apache tomcat 8.0.0 rc5
apache tomcat 8.0.0 rc6
apache tomcat 8.0.0 rc7
apache tomcat 8.0.0 rc8
apache tomcat 8.0.0 rc9
apache tomcat 8.0.0 rc1
apache tomcat 8.0.0 rc2
ibm cognos business intelligence 8.4.1
redhat enterprise linux 6
redhat enterprise linux 6
redhat enterprise linux desktop 6
redhat enterprise linux hpc node 6
ibm cognos express 9.5
ibm security appscan 8.5
ibm rational policy tester 8.5
ibm rational directory server 5.2
ibm security appscan 8.6
ibm websphere message broker 7.0
ibm websphere message broker 8.0
ibm cognos business intelligence 10.1
ibm cognos business intelligence 10.1.1
ibm cognos business intelligence 10.2
ibm qradar security information and event manager 7.1
ibm cognos express 10.1
ibm rational directory server 5.2.0.1
ibm rational directory server 5.2.0.2
ibm rational directory server 5.1.1
ibm rational directory server 5.1.1.1
ibm security appscan 8.7.0.0 -
ibm cognos tm1 10.1.1
ibm cognos business intelligence 10.2.1
ibm qradar security information and event manager 7.2
ibm cognos express 10.2.1
ibm security appscan 8.5
ibm security appscan 8.6
ibm security appscan 8.7
ibm security appscan 8.8
ibm security appscan 9.0
ibm security appscan 8.8
ibm cognos tm1 10.2.2
redhat enterprise linux hpc node 7
ibm urbancode 6.0
ibm urbancode 6.0.1
ibm ims enterprise suite 2.2
ibm algo audit and compliance 2.1
ibm cognos business viewpoint 10.1
ibm cognos business viewpoint 10.1.1
ibm initiate master data service 10.0.0
ibm initiate master data service 10.1.0
ibm urbancode 6.0.0.1
ibm urbancode 6.0.1.1
ibm urbancode 6.0.1.2
ibm urbancode 6.0.1.3
ibm security appscan 9.0
ibm ims enterprise suite 2.1
ibm tivoli application dependency discovery manager 7.2
ibm tivoli application dependency discovery manager 7.2.1
ibm tivoli application dependency discovery manager 7.2.2
ibm websphere application server 3.0.0.4 -
ibm rational collaborative lifecycle management 3.0.1
ibm rational collaborative lifecycle management 4.0
ibm rational collaborative lifecycle management 3.0.1.6
ibm rational collaborative lifecycle management 4.0.1
ibm rational collaborative lifecycle management 4.0.2
ibm rational collaborative lifecycle management 4.0.3
ibm rational collaborative lifecycle management 4.0.4
ibm rational collaborative lifecycle management 4.0.5
ibm rational collaborative lifecycle management 4.0.6
ibm tivoli application dependency discovery manager 7.1.2
ibm urbancode deploy 6.0
ibm urbancode deploy 6.0.1
ibm urbancode deploy 6.0.1.1
ibm urbancode deploy 6.0.1.2
ibm urbancode deploy 6.0.1.3
ibm rational connector 4
ibm openpages grc platform 6.0.1.5
ibm openpages grc platform 6.1.0.1
ibm rational test workbench 8.0
ibm rational test workbench 8.0.0.1
ibm rational test workbench 8.0.0.2
ibm rational test workbench 8.0.0.3
ibm rational test workbench 8.0.1
ibm rational test workbench 8.0.1.1
ibm rational test workbench 8.0.1.2
ibm rational test workbench 8.0.1.3
ibm rational test workbench 8.0.1.4
ibm rational test workbench 8.5
ibm rational test workbench 8.5.0.1
ibm rational test workbench 8.5.0.2
ibm rational doors web access 1.4.0.4
ibm rational doors web access 1.4.0.5
ibm rational doors web access 1.5
ibm rational doors web access 1.5.0.1
ibm rational doors web access 9.5
ibm rational doors web access 9.5.0.1
ibm rational doors web access 9.5.1
ibm rational doors web access 9.5.1.1
ibm rational doors web access 9.5.2
ibm rational doors web access 9.5.2.1
ibm rational doors web access 9.6
ibm rational doors web access 9.6.0.1
redhat enterprise linux desktop 7
redhat enterprise linux server 7
redhat enterprise linux workstation 7
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm tivoli application dependency discovery manager 7.3.0.0