Vulnerability Name: | CVE-2014-0075 (CCN-93365) |
Assigned: | 2013-12-03 |
Published: | 2014-05-27 |
Updated: | 2019-04-15 |
Summary: | Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data. |
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-189 CWE-20 CWE-400 CWE-400
|
Vulnerability Consequences: | Denial of Service |
References: | Source: CONFIRM Type: UNKNOWN http://advisories.mageia.org/MGASA-2014-0268.html
Source: MITRE Type: CNA CVE-2014-0075
Source: CONFIRM Type: UNKNOWN http://linux.oracle.com/errata/ELSA-2014-0865.html
Source: FEDORA Type: UNKNOWN FEDORA-2015-2109
Source: HP Type: UNKNOWN HPSBUX03102
Source: HP Type: UNKNOWN HPSBUX03150
Source: HP Type: UNKNOWN HPSBOV03503
Source: CCN Type: RHSA-2014-0827 Moderate: tomcat security update
Source: CCN Type: RHSA-2014-0834 Moderate: Red Hat JBoss Web Server 2.0.1 tomcat6 security and bug fix update
Source: CCN Type: RHSA-2014-0835 Moderate: Red Hat JBoss Web Server 2.0.1 tomcat7 security update
Source: CCN Type: RHSA-2014-0843 Moderate: Red Hat JBoss Enterprise Application Platform 6.2.4 security update
Source: CCN Type: RHSA-2014-0865 Moderate: tomcat6 security and bug fix update
Source: REDHAT Type: UNKNOWN RHSA-2015:0675
Source: REDHAT Type: UNKNOWN RHSA-2015:0720
Source: REDHAT Type: UNKNOWN RHSA-2015:0765
Source: FULLDISC Type: UNKNOWN 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
Source: SECUNIA Type: UNKNOWN 59121
Source: SECUNIA Type: UNKNOWN 59616
Source: SECUNIA Type: UNKNOWN 59678
Source: SECUNIA Type: UNKNOWN 59732
Source: SECUNIA Type: UNKNOWN 59835
Source: SECUNIA Type: UNKNOWN 59849
Source: SECUNIA Type: UNKNOWN 59873
Source: SECUNIA Type: UNKNOWN 60729
Source: SECUNIA Type: UNKNOWN 60793
Source: CONFIRM Type: UNKNOWN http://svn.apache.org/viewvc?view=revision&revision=1578337
Source: CONFIRM Type: UNKNOWN http://svn.apache.org/viewvc?view=revision&revision=1578341
Source: CONFIRM Type: UNKNOWN http://svn.apache.org/viewvc?view=revision&revision=1579262
Source: CONFIRM Type: Vendor Advisory http://tomcat.apache.org/security-6.html
Source: CONFIRM Type: Vendor Advisory http://tomcat.apache.org/security-7.html
Source: CCN Type: Apache Web Site Fixed in Apache Tomcat 7.0.54
Source: CONFIRM Type: Vendor Advisory http://tomcat.apache.org/security-8.html
Source: CONFIRM Type: UNKNOWN http://www-01.ibm.com/support/docview.wss?uid=swg21678231
Source: CONFIRM Type: UNKNOWN http://www-01.ibm.com/support/docview.wss?uid=swg21680603
Source: CONFIRM Type: UNKNOWN http://www-01.ibm.com/support/docview.wss?uid=swg21681528
Source: CCN Type: IBM Security Bulletin 1695800 Tivoli Common Reporting iFixes for CVE-2014-3566,CVE-2014-6145,CVE-2014-1568,CVE-2014-4263,CVE-2014-3513,CVE-2014-3567,CVE-2014-3568,CVE-2014-0107,CVE-2014-0075,CVE-2014-0096,CVE-2014-0099,CVE-2014-0119,CVE-2014-0878,CVE-2014-0460
Source: DEBIAN Type: UNKNOWN DSA-3447
Source: DEBIAN Type: UNKNOWN DSA-3530
Source: CCN Type: IBM Security Bulletin N1020714 Vulnerabilities in Tomcat affect Power Hardware Management Console (CVE-2013-4444, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0227)
Source: CCN Type: IBM Security Bulletin 1677222 Multiple Apache Tomcat vulnerabilities in IBM Algo Audit and Compliance (CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1677448 IBM OpenPages GRC Platform, multiple vulnerabilities in bundled version of Apache Tomcat
Source: CCN Type: IBM Security Bulletin 1678135 Open Source Tomcat vulnerabilities in May 2014 X-Force Report (CVE-2014-0075, CVE-2014-0099) for RAF
Source: CCN Type: IBM Security Bulletin 1678231 Rational Lifecycle Adapter for HP ALM Apache Tomcat fix (CVE-2013-4286, CVE-2014-0033, CVE-2013-4322, CVE-2013-4590, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1678892 Tivoli Application Dependency Discovery Manager - Open Source Tomcat issues reported between March - May 2014.
Source: CCN Type: IBM Security Bulletin 1679568 Rational Test Control Panel in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerablity (CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1680603 Rational Build Forge Security Advisory (CVE-2014-0075, CVE-2014-0099)
Source: CCN Type: IBM Security Bulletin 1681528 Apache Tomcat Vulnerabilities in IBM UrbanCode Release (CVE-2014-0075,CVE-2014-0095,CVE-2014-0096,CVE-2014-0099,CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1681898 Tivoli Netcool Service Quality Manager is affected by the Open Source Tomcat vulnerabilities (CVE-2014-0075 CVE-2014-0095 CVE-2014-0096 CVE-2014-0099 CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1682371 Rational Reporting for Development Intelligence - Open Source Tomcat reported in May 2014 X-Force Report
Source: CCN Type: IBM Security Bulletin 1682376 Rational Insight - Open Source Tomcat reported in May 2014 X-Force Report
Source: CCN Type: IBM Security Bulletin 1682393 Apache Tomcat Vulnerabilities in IBM UrbanCode Deploy (CVE-2014-0075,CVE-2014-0095,CVE-2014-0096,CVE-2014-0099,CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1682740 Cognos BI Server is affected by the following vulnerabilities: CVE-2014-0107, CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0878, CVE-2014-0460
Source: CCN Type: IBM Security Bulletin 1683334 : IBM InfoSphere Guardium Database Activity Monitor is affected by CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119
Source: CCN Type: IBM Security Bulletin 1683430 IBM Cognos Metrics Manager is affected by the following Tomcat vulnerabilities: CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119
Source: CCN Type: IBM Security Bulletin 1683445 IBM Rational Connector for SAP Solution Manager (CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1684768 Rational Directory Server and Rational Directory Administrator can be affected by vulnerabilities (CVE-2014-4263, CVE-2014-0075, CVE-2014-0096, CVE-2014-0099 and CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1684910 IBM Cognos Business Viewpoint is affected by the following Apache Tomcat vulnerabilities (CVE-2014-0075, CVE-2014-0095, CVE-2014-0096. CVE-2014-0099, CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1685137 Websphere Message Broker and IBM Integration Bus are affected by Open Source Tomcat
Source: CCN Type: IBM Security Bulletin 1686477 Multiple Apache Tomcat vulnerabilities in QRadar (CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119)
Source: CCN Type: IBM Security Bulletin 1686516 Multiple vulnerabilities exist in IMS Enterprise Suite SOAP Gateway (CVE-2014-4263, CVE-2014-0075)
Source: CCN Type: IBM Security Bulletin 1688095 Security vulnerabilities in Apache Tomcat for WebSphere Application Server Community Edition 2.1.1.6 and 3.0.0.4CVE-2014-0075, CVE-2014-0096 and CVE-2014-0119
Source: CCN Type: IBM Security Bulletin 1692154 Security vulnerabilities in Apache Tomcat affects multiple IBM Rational products based on IBM's Jazz technology (CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119,)
Source: CCN Type: IBM Security Bulletin 1693076 IBM Cognos TM1 is affected by the following Tomcat vulnerabilities: CVE-2014-0075, CVE-2014-0099
Source: CCN Type: IBM Security Bulletin 1976103 Multiple Security Vulnerabilities in Apache Tomcat affect IBM RLKS Administration and Reporting Tool
Source: MANDRIVA Type: UNKNOWN MDVSA-2015:052
Source: MANDRIVA Type: UNKNOWN MDVSA-2015:053
Source: MANDRIVA Type: UNKNOWN MDVSA-2015:084
Source: CONFIRM Type: UNKNOWN http://www.novell.com/support/kb/doc.php?id=7010166
Source: CCN Type: Oracle CPUOct2016 Oracle Critical Patch Update Advisory - October 2016
Source: CONFIRM Type: UNKNOWN http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Source: CONFIRM Type: UNKNOWN http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Source: CONFIRM Type: UNKNOWN http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
Source: CCN Type: OSVDB ID: 107450 Apache Tomcat Malformed Chunk Request Handling Remote DoS
Source: BUGTRAQ Type: UNKNOWN 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
Source: BID Type: UNKNOWN 67671
Source: CCN Type: BID-67671 Apache Tomcat CVE-2014-0075 Chunk Request Remote Denial Of Service Vulnerability
Source: CONFIRM Type: UNKNOWN http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Source: XF Type: UNKNOWN tomcat-cve20140075-dos(93365)
Source: CONFIRM Type: UNKNOWN https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
Source: MLIST Type: UNKNOWN [tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
Source: CCN Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator) Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator
Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector) IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities
Source: CCN Type: IBM Security Bulletin 6858013 (Tivoli Application Dependency Discovery Manager) TADDM affected by multiple vulnerabilities due to Apache Tomcat libraries
Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-0075
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.47:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.48:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.49:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.52:*:*:*:*:*:*:* Configuration 2: cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.3:*:*:*:*:*:*:* Configuration 3: cpe:/a:apache:tomcat:6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:*:*:*:*:*:*:*:* (Version <= 6.0.39) Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration RedHat 6: cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:* Configuration RedHat 7: cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:* Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:* Configuration RedHat 9: cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:* Configuration RedHat 10: cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:* Configuration CCN 1: cpe:/a:apache:tomcat:6.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.39:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.52:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.47:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.48:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.49:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.1:*:*:*:*:*:*:*AND cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_guardium:8.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_directory_server:5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_guardium:9.0:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_directory_server:5.2.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_directory_server:5.2.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_directory_server:5.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_directory_server:5.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_directory_server:5.1.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_directory_server:5.1.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_automation_framework:3.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_automation_framework:3.0.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_reporting:2.0:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.1:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.3:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.4:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.5:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.6:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_directory_server:6.0:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_directory_server:6.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode:6.0:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode:6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode:6.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:ims_enterprise_suite:2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:algo_audit_and_compliance:2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_viewpoint:10.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_viewpoint:10.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_message_broker:8:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode:6.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode:6.0.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode:6.0.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode:6.0.1.3:*:*:*:*:*:*:*OR cpe:/a:ibm:ims_enterprise_suite:2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_guardium:9.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1.6:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_automation_framework:3.0.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.0:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.0.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.0.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.0.1.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_connector:4:*:*:*:sap_solution_manager:*:*:*OR cpe:/a:ibm:rational_build_forge:7.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_build_forge:7.1.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_build_forge:7.1.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_build_forge:7.1.2.3:*:*:*:*:*:*:*OR cpe:/a:ibm:openpages_grc_platform:6.0.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:openpages_grc_platform:6.1.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_reporting:5.0:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.0.1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.0.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:urbancode:6.0.1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.5:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:2.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.6:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.7:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.8:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.9:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.1:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
apache tomcat 7.0.0
apache tomcat 7.0.0 beta
apache tomcat 7.0.1
apache tomcat 7.0.2
apache tomcat 7.0.2 beta
apache tomcat 7.0.3
apache tomcat 7.0.4
apache tomcat 7.0.4 beta
apache tomcat 7.0.5
apache tomcat 7.0.6
apache tomcat 7.0.7
apache tomcat 7.0.8
apache tomcat 7.0.9
apache tomcat 7.0.10
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.13
apache tomcat 7.0.14
apache tomcat 7.0.15
apache tomcat 7.0.16
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.19
apache tomcat 7.0.20
apache tomcat 7.0.21
apache tomcat 7.0.22
apache tomcat 7.0.23
apache tomcat 7.0.24
apache tomcat 7.0.25
apache tomcat 7.0.26
apache tomcat 7.0.27
apache tomcat 7.0.28
apache tomcat 7.0.29
apache tomcat 7.0.30
apache tomcat 7.0.31
apache tomcat 7.0.32
apache tomcat 7.0.33
apache tomcat 7.0.34
apache tomcat 7.0.35
apache tomcat 7.0.36
apache tomcat 7.0.37
apache tomcat 7.0.38
apache tomcat 7.0.39
apache tomcat 7.0.40
apache tomcat 7.0.41
apache tomcat 7.0.42
apache tomcat 7.0.43
apache tomcat 7.0.44
apache tomcat 7.0.45
apache tomcat 7.0.46
apache tomcat 7.0.47
apache tomcat 7.0.48
apache tomcat 7.0.49
apache tomcat 7.0.50
apache tomcat 7.0.52
apache tomcat 8.0.0 rc1
apache tomcat 8.0.0 rc10
apache tomcat 8.0.0 rc2
apache tomcat 8.0.0 rc5
apache tomcat 8.0.1
apache tomcat 8.0.3
apache tomcat 6
apache tomcat 6.0
apache tomcat 6.0.0
apache tomcat 6.0.0 alpha
apache tomcat 6.0.1
apache tomcat 6.0.1 alpha
apache tomcat 6.0.2
apache tomcat 6.0.2 alpha
apache tomcat 6.0.2 beta
apache tomcat 6.0.3
apache tomcat 6.0.4
apache tomcat 6.0.4 alpha
apache tomcat 6.0.5
apache tomcat 6.0.6
apache tomcat 6.0.6 alpha
apache tomcat 6.0.7
apache tomcat 6.0.7 alpha
apache tomcat 6.0.7 beta
apache tomcat 6.0.8
apache tomcat 6.0.8 alpha
apache tomcat 6.0.9
apache tomcat 6.0.9 beta
apache tomcat 6.0.10
apache tomcat 6.0.11
apache tomcat 6.0.12
apache tomcat 6.0.13
apache tomcat 6.0.14
apache tomcat 6.0.15
apache tomcat 6.0.16
apache tomcat 6.0.17
apache tomcat 6.0.18
apache tomcat 6.0.19
apache tomcat 6.0.20
apache tomcat 6.0.24
apache tomcat 6.0.26
apache tomcat 6.0.27
apache tomcat 6.0.28
apache tomcat 6.0.29
apache tomcat 6.0.30
apache tomcat 6.0.31
apache tomcat 6.0.32
apache tomcat 6.0.33
apache tomcat 6.0.35
apache tomcat 6.0.36
apache tomcat 6.0.37
apache tomcat *
apache tomcat 6.0
apache tomcat 6.0.0
apache tomcat 6.0.1
apache tomcat 6.0.10
apache tomcat 6.0.11
apache tomcat 6.0.12
apache tomcat 6.0.13
apache tomcat 6.0.14
apache tomcat 6.0.15
apache tomcat 6.0.2
apache tomcat 6.0.3
apache tomcat 6.0.4
apache tomcat 6.0.5
apache tomcat 6.0.6
apache tomcat 6.0.7
apache tomcat 6.0.8
apache tomcat 6.0.9
apache tomcat 6.0.16
apache tomcat 6.0.18
apache tomcat 6.0.17
apache tomcat 6.0.20
apache tomcat 6.0.19
apache tomcat 6
apache tomcat 6.0.24
apache tomcat 6.0.26
apache tomcat 6.0.27
apache tomcat 6.0.28
apache tomcat 6.0.29
apache tomcat 7.0.0 beta
apache tomcat 7.0.1
apache tomcat 7.0.2
apache tomcat 7.0.3
apache tomcat 7.0.4
apache tomcat 7.0.8
apache tomcat 7.0.5
apache tomcat 7.0.6
apache tomcat 7.0.7
apache tomcat 7.0.9
apache tomcat 7.0.10
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.13
apache tomcat 6.0.30
apache tomcat 6.0.31
apache tomcat 6.0.32
apache tomcat 7.0.16
apache tomcat 7.0.21
apache tomcat 6.0.33
apache tomcat 7.0.0
apache tomcat 6.0.0 alpha
apache tomcat 6.0.1 alpha
apache tomcat 6.0.2 alpha
apache tomcat 6.0.2 beta
apache tomcat 6.0.4 alpha
apache tomcat 6.0.6 alpha
apache tomcat 6.0.7 alpha
apache tomcat 6.0.7 beta
apache tomcat 6.0.8 alpha
apache tomcat 6.0.9 beta
apache tomcat 7.0.14
apache tomcat 7.0.15
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.19
apache tomcat 7.0.2 beta
apache tomcat 7.0.20
apache tomcat 7.0.22
apache tomcat 7.0.23
apache tomcat 7.0.25
apache tomcat 7.0.4 beta
apache tomcat 6.0.35
apache tomcat 7.0.28
apache tomcat 6.0.36
apache tomcat 7.0.50
apache tomcat 7.0.46
apache tomcat 7.0.45
apache tomcat 7.0.44
apache tomcat 7.0.43
apache tomcat 7.0.42
apache tomcat 7.0.41
apache tomcat 7.0.40
apache tomcat 7.0.39
apache tomcat 7.0.38
apache tomcat 7.0.37
apache tomcat 7.0.36
apache tomcat 7.0.35
apache tomcat 7.0.34
apache tomcat 7.0.33
apache tomcat 7.0.32
apache tomcat 7.0.31
apache tomcat 7.0.30
apache tomcat 7.0.29
apache tomcat 7.0.27
apache tomcat 7.0.26
apache tomcat 7.0.24
apache tomcat 6.0.37
apache tomcat 8.0.0 rc5
apache tomcat 8.0.0 rc1
apache tomcat 8.0.0 rc2
apache tomcat 6.0.39
apache tomcat 7.0.52
apache tomcat 8.0.3
apache tomcat 7.0.47
apache tomcat 7.0.48
apache tomcat 7.0.49
apache tomcat 8.0.0 rc10
apache tomcat 8.0.1
ibm cognos business intelligence 8.4.1
redhat enterprise linux 6
redhat enterprise linux 6
redhat enterprise linux desktop 6
redhat enterprise linux hpc node 6
ibm infosphere guardium 8.2
ibm rational directory server 5.2
ibm infosphere guardium 9.0
ibm cognos business intelligence 10.1
ibm cognos business intelligence 10.1.1
ibm cognos business intelligence 10.2
ibm qradar security information and event manager 7.1
ibm rational directory server 5.2.0.1
ibm rational directory server 5.2.0.2
ibm rational directory server 5.2.1
ibm rational directory server 5.1.1
ibm rational directory server 5.1.1.1
ibm rational directory server 5.1.1.2
ibm rational insight 1.1
ibm rational insight 1.1.1
ibm rational insight 1.1.1.1
ibm cognos tm1 10.1.1
ibm rational automation framework 3.0.1
ibm rational automation framework 3.0.1.1
ibm cognos business intelligence 10.2.1
ibm qradar security information and event manager 7.2
ibm rational reporting 2.0
ibm rational reporting 2.0.1
ibm rational reporting 2.0.3
ibm rational reporting 2.0.4
ibm rational reporting 2.0.5
ibm rational reporting 2.0.6
ibm rational directory server 6.0
ibm rational directory server 6.0.0.1
ibm cognos tm1 10.2.2
ibm urbancode deploy 6.1.0.2
redhat enterprise linux hpc node 7
ibm urbancode 6.0
ibm urbancode 6.1
ibm urbancode 6.0.1
ibm ims enterprise suite 2.2
ibm algo audit and compliance 2.1
ibm cognos business viewpoint 10.1
ibm cognos business viewpoint 10.1.1
ibm websphere message broker 8
ibm urbancode 6.0.0.1
ibm urbancode 6.0.1.1
ibm urbancode 6.0.1.2
ibm urbancode 6.0.1.3
ibm ims enterprise suite 2.1
ibm tivoli application dependency discovery manager 7.2
ibm tivoli application dependency discovery manager 7.2.1
ibm tivoli application dependency discovery manager 7.2.2
ibm websphere application server 3.0.0.4 -
ibm rational collaborative lifecycle management 3.0.1
ibm rational collaborative lifecycle management 4.0
ibm infosphere guardium 9.1
ibm rational license key server 8.1.4
ibm rational license key server 8.1.4.2
ibm rational license key server 8.1.4.3
ibm rational collaborative lifecycle management 3.0.1.6
ibm rational collaborative lifecycle management 4.0.1
ibm rational collaborative lifecycle management 4.0.2
ibm rational collaborative lifecycle management 4.0.3
ibm rational collaborative lifecycle management 4.0.4
ibm rational collaborative lifecycle management 4.0.5
ibm rational collaborative lifecycle management 4.0.6
ibm rational collaborative lifecycle management 5.0
ibm tivoli application dependency discovery manager 7.1.2
ibm rational automation framework 3.0.1.2
ibm urbancode deploy 6.0
ibm urbancode deploy 6.0.1
ibm urbancode deploy 6.0.1.1
ibm urbancode deploy 6.0.1.2
ibm urbancode deploy 6.0.1.3
ibm rational connector 4
ibm rational build forge 7.1.2
ibm rational build forge 7.1.2.1
ibm rational build forge 7.1.2.2
ibm rational build forge 7.1.2.3
ibm openpages grc platform 6.0.1.5
ibm openpages grc platform 6.1.0.1
ibm rational reporting 5.0
ibm rational insight 1.1.1.4
ibm rational collaborative lifecycle management 4.0.7
ibm rational collaborative lifecycle management 5.0.1
ibm rational insight 1.1.1.2
ibm rational insight 1.1.1.3
ibm rational test workbench 8.0
ibm rational test workbench 8.0.0.1
ibm rational test workbench 8.0.0.2
ibm rational test workbench 8.0.0.3
ibm rational test workbench 8.0.1
ibm rational test workbench 8.0.1.1
ibm rational test workbench 8.0.1.2
ibm rational test workbench 8.0.1.3
ibm rational test workbench 8.0.1.4
ibm rational test workbench 8.5
ibm rational test workbench 8.5.0.1
ibm rational test workbench 8.5.0.2
ibm urbancode deploy 6.0.1.4
ibm urbancode deploy 6.0.1.5
ibm urbancode deploy 6.1
ibm urbancode deploy 6.1.0.1
ibm urbancode 6.0.1.4
ibm cognos tm1 10.2
redhat enterprise linux desktop 7
redhat enterprise linux server 7
redhat enterprise linux workstation 7
ibm rational license key server 8.1.4.4
ibm rational license key server 8.1.4.5
ibm tivoli common reporting 2.1
ibm tivoli common reporting 2.1.1
ibm tivoli common reporting 3.1
ibm tivoli common reporting 3.1.0.1
ibm tivoli common reporting 3.1.0.2
ibm rational license key server 8.1.4.6
ibm rational license key server 8.1.4.7
ibm rational license key server 8.1.4.8
ibm rational license key server 8.1.4.9
ibm rational license key server 8.1.4.1
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm tivoli application dependency discovery manager 7.3.0.0