Vulnerability Name: CVE-2014-0075 (CCN-93365) Assigned: 2013-12-03 Published: 2014-05-27 Updated: 2019-04-15 Summary: Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P )3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-189 CWE-20 CWE-400 CWE-400 Vulnerability Consequences: Denial of Service References: Source: CONFIRM Type: UNKNOWNhttp://advisories.mageia.org/MGASA-2014-0268.html Source: MITRE Type: CNACVE-2014-0075 Source: CONFIRM Type: UNKNOWNhttp://linux.oracle.com/errata/ELSA-2014-0865.html Source: FEDORA Type: UNKNOWNFEDORA-2015-2109 Source: HP Type: UNKNOWNHPSBUX03102 Source: HP Type: UNKNOWNHPSBUX03150 Source: HP Type: UNKNOWNHPSBOV03503 Source: CCN Type: RHSA-2014-0827Moderate: tomcat security update Source: CCN Type: RHSA-2014-0834Moderate: Red Hat JBoss Web Server 2.0.1 tomcat6 security and bug fix update Source: CCN Type: RHSA-2014-0835Moderate: Red Hat JBoss Web Server 2.0.1 tomcat7 security update Source: CCN Type: RHSA-2014-0843Moderate: Red Hat JBoss Enterprise Application Platform 6.2.4 security update Source: CCN Type: RHSA-2014-0865Moderate: tomcat6 security and bug fix update Source: REDHAT Type: UNKNOWNRHSA-2015:0675 Source: REDHAT Type: UNKNOWNRHSA-2015:0720 Source: REDHAT Type: UNKNOWNRHSA-2015:0765 Source: FULLDISC Type: UNKNOWN20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities Source: SECUNIA Type: UNKNOWN59121 Source: SECUNIA Type: UNKNOWN59616 Source: SECUNIA Type: UNKNOWN59678 Source: SECUNIA Type: UNKNOWN59732 Source: SECUNIA Type: UNKNOWN59835 Source: SECUNIA Type: UNKNOWN59849 Source: SECUNIA Type: UNKNOWN59873 Source: SECUNIA Type: UNKNOWN60729 Source: SECUNIA Type: UNKNOWN60793 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1578337 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1578341 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1579262 Source: CONFIRM Type: Vendor Advisoryhttp://tomcat.apache.org/security-6.html Source: CONFIRM Type: Vendor Advisoryhttp://tomcat.apache.org/security-7.html Source: CCN Type: Apache Web SiteFixed in Apache Tomcat 7.0.54 Source: CONFIRM Type: Vendor Advisoryhttp://tomcat.apache.org/security-8.html Source: CONFIRM Type: UNKNOWNhttp://www-01.ibm.com/support/docview.wss?uid=swg21678231 Source: CONFIRM Type: UNKNOWNhttp://www-01.ibm.com/support/docview.wss?uid=swg21680603 Source: CONFIRM Type: UNKNOWNhttp://www-01.ibm.com/support/docview.wss?uid=swg21681528 Source: CCN Type: IBM Security Bulletin 1695800Tivoli Common Reporting iFixes for CVE-2014-3566,CVE-2014-6145,CVE-2014-1568,CVE-2014-4263,CVE-2014-3513,CVE-2014-3567,CVE-2014-3568,CVE-2014-0107,CVE-2014-0075,CVE-2014-0096,CVE-2014-0099,CVE-2014-0119,CVE-2014-0878,CVE-2014-0460 Source: DEBIAN Type: UNKNOWNDSA-3447 Source: DEBIAN Type: UNKNOWNDSA-3530 Source: CCN Type: IBM Security Bulletin N1020714Vulnerabilities in Tomcat affect Power Hardware Management Console (CVE-2013-4444, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0227) Source: CCN Type: IBM Security Bulletin 1677222Multiple Apache Tomcat vulnerabilities in IBM Algo Audit and Compliance (CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1677448IBM OpenPages GRC Platform, multiple vulnerabilities in bundled version of Apache Tomcat Source: CCN Type: IBM Security Bulletin 1678135Open Source Tomcat vulnerabilities in May 2014 X-Force Report (CVE-2014-0075, CVE-2014-0099) for RAF Source: CCN Type: IBM Security Bulletin 1678231Rational Lifecycle Adapter for HP ALM Apache Tomcat fix (CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1678892Tivoli Application Dependency Discovery Manager - Open Source Tomcat issues reported between March - May 2014. Source: CCN Type: IBM Security Bulletin 1679568Rational Test Control Panel in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerablity (CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1680603Rational Build Forge Security Advisory (CVE-2014-0075, CVE-2014-0099) Source: CCN Type: IBM Security Bulletin 1681528Apache Tomcat Vulnerabilities in IBM UrbanCode Release (CVE-2014-0075,CVE-2014-0095,CVE-2014-0096,CVE-2014-0099,CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1681898Tivoli Netcool Service Quality Manager is affected by the Open Source Tomcat vulnerabilities (CVE-2014-0075 CVE-2014-0095 CVE-2014-0096 CVE-2014-0099 CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1682371Rational Reporting for Development Intelligence - Open Source Tomcat reported in May 2014 X-Force Report Source: CCN Type: IBM Security Bulletin 1682376Rational Insight - Open Source Tomcat reported in May 2014 X-Force Report Source: CCN Type: IBM Security Bulletin 1682393Apache Tomcat Vulnerabilities in IBM UrbanCode Deploy (CVE-2014-0075,CVE-2014-0095,CVE-2014-0096,CVE-2014-0099,CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1682740Cognos BI Server is affected by the following vulnerabilities: CVE-2014-0107, CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0878, CVE-2014-0460 Source: CCN Type: IBM Security Bulletin 1683334: IBM InfoSphere Guardium Database Activity Monitor is affected by CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119 Source: CCN Type: IBM Security Bulletin 1683430IBM Cognos Metrics Manager is affected by the following Tomcat vulnerabilities: CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119 Source: CCN Type: IBM Security Bulletin 1683445IBM Rational Connector for SAP Solution Manager (CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1684768Rational Directory Server and Rational Directory Administrator can be affected by vulnerabilities (CVE-2014-4263, CVE-2014-0075, CVE-2014-0096, CVE-2014-0099 and CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1684910IBM Cognos Business Viewpoint is affected by the following Apache Tomcat vulnerabilities (CVE-2014-0075, CVE-2014-0095, CVE-2014-0096. CVE-2014-0099, CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1685137Websphere Message Broker and IBM Integration Bus are affected by Open Source Tomcat Source: CCN Type: IBM Security Bulletin 1686477Multiple Apache Tomcat vulnerabilities in QRadar (CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119) Source: CCN Type: IBM Security Bulletin 1686516Multiple vulnerabilities exist in IMS Enterprise Suite SOAP Gateway (CVE-2014-4263, CVE-2014-0075) Source: CCN Type: IBM Security Bulletin 1688095Security vulnerabilities in Apache Tomcat for WebSphere Application Server Community Edition 2.1.1.6 and 3.0.0.4CVE-2014-0075, CVE-2014-0096 and CVE-2014-0119 Source: CCN Type: IBM Security Bulletin 1692154Security vulnerabilities in Apache Tomcat affects multiple IBM Rational products based on IBM's Jazz technology (CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119,) Source: CCN Type: IBM Security Bulletin 1693076IBM Cognos TM1 is affected by the following Tomcat vulnerabilities: CVE-2014-0075, CVE-2014-0099 Source: CCN Type: IBM Security Bulletin 1976103Multiple Security Vulnerabilities in Apache Tomcat affect IBM RLKS Administration and Reporting Tool Source: MANDRIVA Type: UNKNOWNMDVSA-2015:052 Source: MANDRIVA Type: UNKNOWNMDVSA-2015:053 Source: MANDRIVA Type: UNKNOWNMDVSA-2015:084 Source: CONFIRM Type: UNKNOWNhttp://www.novell.com/support/kb/doc.php?id=7010166 Source: CCN Type: Oracle CPUOct2016Oracle Critical Patch Update Advisory - October 2016 Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html Source: CCN Type: OSVDB ID: 107450Apache Tomcat Malformed Chunk Request Handling Remote DoS Source: BUGTRAQ Type: UNKNOWN20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities Source: BID Type: UNKNOWN67671 Source: CCN Type: BID-67671Apache Tomcat CVE-2014-0075 Chunk Request Remote Denial Of Service Vulnerability Source: CONFIRM Type: UNKNOWNhttp://www.vmware.com/security/advisories/VMSA-2014-0012.html Source: XF Type: UNKNOWNtomcat-cve20140075-dos(93365) Source: CONFIRM Type: UNKNOWNhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013 Source: MLIST Type: UNKNOWN[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/ Source: CCN Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator)Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector)IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6858013 (Tivoli Application Dependency Discovery Manager)TADDM affected by multiple vulnerabilities due to Apache Tomcat libraries Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2014-0075 Vulnerable Configuration: Configuration 1 :cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.47:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.48:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.49:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.52:*:*:*:*:*:*:* Configuration 2 :cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.3:*:*:*:*:*:*:* Configuration 3 :cpe:/a:apache:tomcat:6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.9:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version <= 6.0.39) Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration RedHat 6 :cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:* Configuration RedHat 7 :cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:* Configuration RedHat 8 :cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:* Configuration RedHat 9 :cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:* Configuration RedHat 10 :cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:tomcat:6.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.9:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.52:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.47:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.48:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.49:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.1:*:*:*:*:*:*:* AND cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:* OR cpe:/a:ibm:infosphere_guardium:8.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.2:*:*:*:*:*:*:* OR cpe:/a:ibm:infosphere_guardium:9.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.2.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:5.1.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_tm1:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_automation_framework:3.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_automation_framework:3.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_reporting:2.0:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.1:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.3:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.4:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.5:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.6:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_directory_server:6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_directory_server:6.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:ims_enterprise_suite:2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_audit_and_compliance:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_viewpoint:10.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_viewpoint:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_message_broker:8:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:ims_enterprise_suite:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0:*:*:*:*:*:*:* OR cpe:/a:ibm:infosphere_guardium:9.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_automation_framework:3.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_connector:4:*:*:*:sap_solution_manager:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_build_forge:7.1.2.3:*:*:*:*:*:*:* OR cpe:/a:ibm:openpages_grc_platform:6.0.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:openpages_grc_platform:6.1.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_reporting:5.0:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.0.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:urbancode:6.0.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_tm1:10.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.5:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:2.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.8:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.9:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
apache tomcat 7.0.0
apache tomcat 7.0.0 beta
apache tomcat 7.0.1
apache tomcat 7.0.2
apache tomcat 7.0.2 beta
apache tomcat 7.0.3
apache tomcat 7.0.4
apache tomcat 7.0.4 beta
apache tomcat 7.0.5
apache tomcat 7.0.6
apache tomcat 7.0.7
apache tomcat 7.0.8
apache tomcat 7.0.9
apache tomcat 7.0.10
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.13
apache tomcat 7.0.14
apache tomcat 7.0.15
apache tomcat 7.0.16
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.19
apache tomcat 7.0.20
apache tomcat 7.0.21
apache tomcat 7.0.22
apache tomcat 7.0.23
apache tomcat 7.0.24
apache tomcat 7.0.25
apache tomcat 7.0.26
apache tomcat 7.0.27
apache tomcat 7.0.28
apache tomcat 7.0.29
apache tomcat 7.0.30
apache tomcat 7.0.31
apache tomcat 7.0.32
apache tomcat 7.0.33
apache tomcat 7.0.34
apache tomcat 7.0.35
apache tomcat 7.0.36
apache tomcat 7.0.37
apache tomcat 7.0.38
apache tomcat 7.0.39
apache tomcat 7.0.40
apache tomcat 7.0.41
apache tomcat 7.0.42
apache tomcat 7.0.43
apache tomcat 7.0.44
apache tomcat 7.0.45
apache tomcat 7.0.46
apache tomcat 7.0.47
apache tomcat 7.0.48
apache tomcat 7.0.49
apache tomcat 7.0.50
apache tomcat 7.0.52
apache tomcat 8.0.0 rc1
apache tomcat 8.0.0 rc10
apache tomcat 8.0.0 rc2
apache tomcat 8.0.0 rc5
apache tomcat 8.0.1
apache tomcat 8.0.3
apache tomcat 6
apache tomcat 6.0
apache tomcat 6.0.0
apache tomcat 6.0.0 alpha
apache tomcat 6.0.1
apache tomcat 6.0.1 alpha
apache tomcat 6.0.2
apache tomcat 6.0.2 alpha
apache tomcat 6.0.2 beta
apache tomcat 6.0.3
apache tomcat 6.0.4
apache tomcat 6.0.4 alpha
apache tomcat 6.0.5
apache tomcat 6.0.6
apache tomcat 6.0.6 alpha
apache tomcat 6.0.7
apache tomcat 6.0.7 alpha
apache tomcat 6.0.7 beta
apache tomcat 6.0.8
apache tomcat 6.0.8 alpha
apache tomcat 6.0.9
apache tomcat 6.0.9 beta
apache tomcat 6.0.10
apache tomcat 6.0.11
apache tomcat 6.0.12
apache tomcat 6.0.13
apache tomcat 6.0.14
apache tomcat 6.0.15
apache tomcat 6.0.16
apache tomcat 6.0.17
apache tomcat 6.0.18
apache tomcat 6.0.19
apache tomcat 6.0.20
apache tomcat 6.0.24
apache tomcat 6.0.26
apache tomcat 6.0.27
apache tomcat 6.0.28
apache tomcat 6.0.29
apache tomcat 6.0.30
apache tomcat 6.0.31
apache tomcat 6.0.32
apache tomcat 6.0.33
apache tomcat 6.0.35
apache tomcat 6.0.36
apache tomcat 6.0.37
apache tomcat *
apache tomcat 6.0
apache tomcat 6.0.0
apache tomcat 6.0.1
apache tomcat 6.0.10
apache tomcat 6.0.11
apache tomcat 6.0.12
apache tomcat 6.0.13
apache tomcat 6.0.14
apache tomcat 6.0.15
apache tomcat 6.0.2
apache tomcat 6.0.3
apache tomcat 6.0.4
apache tomcat 6.0.5
apache tomcat 6.0.6
apache tomcat 6.0.7
apache tomcat 6.0.8
apache tomcat 6.0.9
apache tomcat 6.0.16
apache tomcat 6.0.18
apache tomcat 6.0.17
apache tomcat 6.0.20
apache tomcat 6.0.19
apache tomcat 6
apache tomcat 6.0.24
apache tomcat 6.0.26
apache tomcat 6.0.27
apache tomcat 6.0.28
apache tomcat 6.0.29
apache tomcat 7.0.0 beta
apache tomcat 7.0.1
apache tomcat 7.0.2
apache tomcat 7.0.3
apache tomcat 7.0.4
apache tomcat 7.0.8
apache tomcat 7.0.5
apache tomcat 7.0.6
apache tomcat 7.0.7
apache tomcat 7.0.9
apache tomcat 7.0.10
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.13
apache tomcat 6.0.30
apache tomcat 6.0.31
apache tomcat 6.0.32
apache tomcat 7.0.16
apache tomcat 7.0.21
apache tomcat 6.0.33
apache tomcat 7.0.0
apache tomcat 6.0.0 alpha
apache tomcat 6.0.1 alpha
apache tomcat 6.0.2 alpha
apache tomcat 6.0.2 beta
apache tomcat 6.0.4 alpha
apache tomcat 6.0.6 alpha
apache tomcat 6.0.7 alpha
apache tomcat 6.0.7 beta
apache tomcat 6.0.8 alpha
apache tomcat 6.0.9 beta
apache tomcat 7.0.14
apache tomcat 7.0.15
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.19
apache tomcat 7.0.2 beta
apache tomcat 7.0.20
apache tomcat 7.0.22
apache tomcat 7.0.23
apache tomcat 7.0.25
apache tomcat 7.0.4 beta
apache tomcat 6.0.35
apache tomcat 7.0.28
apache tomcat 6.0.36
apache tomcat 7.0.50
apache tomcat 7.0.46
apache tomcat 7.0.45
apache tomcat 7.0.44
apache tomcat 7.0.43
apache tomcat 7.0.42
apache tomcat 7.0.41
apache tomcat 7.0.40
apache tomcat 7.0.39
apache tomcat 7.0.38
apache tomcat 7.0.37
apache tomcat 7.0.36
apache tomcat 7.0.35
apache tomcat 7.0.34
apache tomcat 7.0.33
apache tomcat 7.0.32
apache tomcat 7.0.31
apache tomcat 7.0.30
apache tomcat 7.0.29
apache tomcat 7.0.27
apache tomcat 7.0.26
apache tomcat 7.0.24
apache tomcat 6.0.37
apache tomcat 8.0.0 rc5
apache tomcat 8.0.0 rc1
apache tomcat 8.0.0 rc2
apache tomcat 6.0.39
apache tomcat 7.0.52
apache tomcat 8.0.3
apache tomcat 7.0.47
apache tomcat 7.0.48
apache tomcat 7.0.49
apache tomcat 8.0.0 rc10
apache tomcat 8.0.1
ibm cognos business intelligence 8.4.1
redhat enterprise linux 6
redhat enterprise linux 6
redhat enterprise linux desktop 6
redhat enterprise linux hpc node 6
ibm infosphere guardium 8.2
ibm rational directory server 5.2
ibm infosphere guardium 9.0
ibm cognos business intelligence 10.1
ibm cognos business intelligence 10.1.1
ibm cognos business intelligence 10.2
ibm qradar security information and event manager 7.1
ibm rational directory server 5.2.0.1
ibm rational directory server 5.2.0.2
ibm rational directory server 5.2.1
ibm rational directory server 5.1.1
ibm rational directory server 5.1.1.1
ibm rational directory server 5.1.1.2
ibm rational insight 1.1
ibm rational insight 1.1.1
ibm rational insight 1.1.1.1
ibm cognos tm1 10.1.1
ibm rational automation framework 3.0.1
ibm rational automation framework 3.0.1.1
ibm cognos business intelligence 10.2.1
ibm qradar security information and event manager 7.2
ibm rational reporting 2.0
ibm rational reporting 2.0.1
ibm rational reporting 2.0.3
ibm rational reporting 2.0.4
ibm rational reporting 2.0.5
ibm rational reporting 2.0.6
ibm rational directory server 6.0
ibm rational directory server 6.0.0.1
ibm cognos tm1 10.2.2
ibm urbancode deploy 6.1.0.2
redhat enterprise linux hpc node 7
ibm urbancode 6.0
ibm urbancode 6.1
ibm urbancode 6.0.1
ibm ims enterprise suite 2.2
ibm algo audit and compliance 2.1
ibm cognos business viewpoint 10.1
ibm cognos business viewpoint 10.1.1
ibm websphere message broker 8
ibm urbancode 6.0.0.1
ibm urbancode 6.0.1.1
ibm urbancode 6.0.1.2
ibm urbancode 6.0.1.3
ibm ims enterprise suite 2.1
ibm tivoli application dependency discovery manager 7.2
ibm tivoli application dependency discovery manager 7.2.1
ibm tivoli application dependency discovery manager 7.2.2
ibm websphere application server 3.0.0.4 -
ibm rational collaborative lifecycle management 3.0.1
ibm rational collaborative lifecycle management 4.0
ibm infosphere guardium 9.1
ibm rational license key server 8.1.4
ibm rational license key server 8.1.4.2
ibm rational license key server 8.1.4.3
ibm rational collaborative lifecycle management 3.0.1.6
ibm rational collaborative lifecycle management 4.0.1
ibm rational collaborative lifecycle management 4.0.2
ibm rational collaborative lifecycle management 4.0.3
ibm rational collaborative lifecycle management 4.0.4
ibm rational collaborative lifecycle management 4.0.5
ibm rational collaborative lifecycle management 4.0.6
ibm rational collaborative lifecycle management 5.0
ibm tivoli application dependency discovery manager 7.1.2
ibm rational automation framework 3.0.1.2
ibm urbancode deploy 6.0
ibm urbancode deploy 6.0.1
ibm urbancode deploy 6.0.1.1
ibm urbancode deploy 6.0.1.2
ibm urbancode deploy 6.0.1.3
ibm rational connector 4
ibm rational build forge 7.1.2
ibm rational build forge 7.1.2.1
ibm rational build forge 7.1.2.2
ibm rational build forge 7.1.2.3
ibm openpages grc platform 6.0.1.5
ibm openpages grc platform 6.1.0.1
ibm rational reporting 5.0
ibm rational insight 1.1.1.4
ibm rational collaborative lifecycle management 4.0.7
ibm rational collaborative lifecycle management 5.0.1
ibm rational insight 1.1.1.2
ibm rational insight 1.1.1.3
ibm rational test workbench 8.0
ibm rational test workbench 8.0.0.1
ibm rational test workbench 8.0.0.2
ibm rational test workbench 8.0.0.3
ibm rational test workbench 8.0.1
ibm rational test workbench 8.0.1.1
ibm rational test workbench 8.0.1.2
ibm rational test workbench 8.0.1.3
ibm rational test workbench 8.0.1.4
ibm rational test workbench 8.5
ibm rational test workbench 8.5.0.1
ibm rational test workbench 8.5.0.2
ibm urbancode deploy 6.0.1.4
ibm urbancode deploy 6.0.1.5
ibm urbancode deploy 6.1
ibm urbancode deploy 6.1.0.1
ibm urbancode 6.0.1.4
ibm cognos tm1 10.2
redhat enterprise linux desktop 7
redhat enterprise linux server 7
redhat enterprise linux workstation 7
ibm rational license key server 8.1.4.4
ibm rational license key server 8.1.4.5
ibm tivoli common reporting 2.1
ibm tivoli common reporting 2.1.1
ibm tivoli common reporting 3.1
ibm tivoli common reporting 3.1.0.1
ibm tivoli common reporting 3.1.0.2
ibm rational license key server 8.1.4.6
ibm rational license key server 8.1.4.7
ibm rational license key server 8.1.4.8
ibm rational license key server 8.1.4.9
ibm rational license key server 8.1.4.1
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm tivoli application dependency discovery manager 7.3.0.0