Vulnerability Name:

CVE-2014-0227 (CCN-100751)

Assigned:2013-12-03
Published:2015-02-09
Updated:2019-04-15
Summary:java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P)
4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-19
CWE-400
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: UNKNOWN
http://advisories.mageia.org/MGASA-2015-0081.html

Source: BUGTRAQ
Type: UNKNOWN
20150209 [SECURITY] CVE-2014-0227 Apache Tomcat Request Smuggling

Source: CCN
Type: BugTraq Mailing List, Mon Feb 09 2015 - 03:12:47 CST
[SECURITY] CVE-2014-0227 Apache Tomcat Request Smuggling

Source: MITRE
Type: CNA
CVE-2014-0227

Source: FEDORA
Type: UNKNOWN
FEDORA-2015-2109

Source: CCN
Type: Apache Mailing List, Mon, 09 Feb 2015 09:12:47 GMT
CVE-2014-0227 Request Smuggling

Source: HP
Type: UNKNOWN
HPSBUX03341

Source: HP
Type: UNKNOWN
SSRT102066

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0675

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0720

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0765

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0983

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0991

Source: CONFIRM
Type: UNKNOWN
http://svn.apache.org/viewvc?view=revision&revision=1600984

Source: CCN
Type: Apache Web site
Tomcat

Source: CONFIRM
Type: Vendor Advisory
http://tomcat.apache.org/security-6.html

Source: CONFIRM
Type: Vendor Advisory
http://tomcat.apache.org/security-7.html

Source: CONFIRM
Type: Vendor Advisory
http://tomcat.apache.org/security-8.html

Source: CCN
Type: IBM Security Bulletin 1959999
Open Source Apache Tomcat prior to 6.0.42 as used in IBM QRadar Security Information and Event Manager 7.1 MR2, and 7.2.4 is vulnerable to HTTP request smuggling. (CVE-2014-0227)

Source: DEBIAN
Type: UNKNOWN
DSA-3447

Source: DEBIAN
Type: UNKNOWN
DSA-3530

Source: CCN
Type: IBM Security Bulletin N1020714
Vulnerabilities in Tomcat affect Power Hardware Management Console (CVE-2013-4444, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin S1005124
Apache Tomcat vulnerability affects IBM Storwize V7000 Unified (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin S1005156
Apache Tomcat vulnerability affects IBM SONAS (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin S1005187
A vulnerability in Open Source Apache Tomcat affects IBM FlashSystem 840, (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin S1005204
A vulnerability in Open Source Apache Tomcat affects the IBM FlashSystem V840, (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin S1005302
Apache Tomcat vulnerabilities affect IBM SAN Volume Controller and Storwize Family (CVE-2014-0227 CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin S1005346
A vulnerability in Open Source Apache Tomcat affects the IBM FlashSystem 900, (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1697709
WebSphere Message Broker and IBM Integration Bus are affected by Open Source Tomcat vulnerability (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1698085
Rational DOORS Web Access is affected by Apache Tomcat vulnerabilities (CVE-2014-0227, CVE-2014-7810, CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1698437
Apache Tomcat request smuggling affects Algo Audit and Compliance (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1698472
Vulnerability in Apache Tomcat affects IBM uBuild (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1698478
Vulnerability in Apache Tomcat affects IBM UrbanCode Build (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1700351
Security vulnerabilities in Apache Tomcat affects multiple IBM Rational products based on IBM's Jazz technology (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1882717
RC4 stream cipher vulnerability and HTTP request smuggling vulnerability affect IBM Tivoli Application Dependency Discovery Manager (TADDM) (CVE-2015-2808, CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1883050
A security vulnerability in Apache Tomcat affects Rational Insight (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1883051
A security vulnerability in Apache Tomcat affects Rational Reporting for Development Intelligence (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1883861
IBM UrbanCode Release is vulnerable to HTTP request smuggling potentially allowing an attacker to conduct XSS attacks (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1902401
Vulnerability in Apache Tomcat affects Rational Lifecycle Integration Adapter for HP ALM (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1903036
Vulnerability in Tomcat affects IBM Cognos Metrics Manager (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1903752
IBM Cognos Business Intelligence Sever 2015Q2 Security Updater : IBM Cognos Business Intelligence Server is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 1957815
Vulnerability in Apache Tomcat may affect IBM WebSphere Application Server Community Edition (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1959981
Open Source Apache Tomcat vulnerability - Reported in 02/09/2015 X-Force Report affects IBM Algorithmics One (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1960149
Rational Build Forge affected by Apache Tomcat vulnerability (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1960521
Open Source Apache Tomcat vulnerability (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1960572
IBM WebSphere Cast Iron Solution is affected by Apache Tomcat vulnerabilities (CVE-2014-0230, CVE-2014-7810,CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1961208
Multiple security vulnerabilities in Open Source Apache Tomcat affect IBM Cognos Business Viewpoint (CVE-2014-0227, CVE-2014-0230, CVE-2014-7810)

Source: CCN
Type: IBM Security Bulletin 1963024
Multiple vulnerability in Product IBM Tivoli Common Reporting(CVE-2015-0488, CVE-2015-0478, CVE-2015-2808, CVE-2015-1916, CVE-2014-0227, CVE-2015-0209 , CVE-2015-0286 , CVE-2015-0289)

Source: CCN
Type: IBM Security Bulletin 1963341
Multiple vulnerabilities in unzip, krb5, tomcat, affect IBM SmartCloud Provisioning for IBM Software Virtual Appliance

Source: CCN
Type: IBM Security Bulletin 1966177
IBM Cognos TM1 is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 1966846
Vulnerabilities in Apache Tomcat affecting Sametime Unified Telephony

Source: CCN
Type: IBM Security Bulletin 1976103
Multiple Security Vulnerabilities in Apache Tomcat affect IBM RLKS Administration and Reporting Tool

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2015:052

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2015:053

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2015:084

Source: CCN
Type: Oracle CPUOct2016
Oracle Critical Patch Update Advisory - October 2016

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html

Source: CCN
Type: Oracle Critical Patch Update - July 2015
Oracle Critical Patch Update - July 2015

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Source: BID
Type: UNKNOWN
72717

Source: CCN
Type: BID-72717
Apache Tomcat CVE-2014-0227 Chunk Request Remote Denial Of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1032791

Source: UBUNTU
Type: UNKNOWN
USN-2654-1

Source: UBUNTU
Type: UNKNOWN
USN-2655-1

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1109196

Source: XF
Type: UNKNOWN
apache-tomcat-cve20140227-smuggling(100751)

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/

Source: CONFIRM
Type: UNKNOWN
https://source.jboss.org/changelog/JBossWeb?cs=2455

Source: CCN
Type: IBM Security Bulletin 1959291
Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator)
Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator

Source: CCN
Type: IBM Security Bulletin 6595755 (Disconnected Log Collector)
IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-0227

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.39:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.41:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.48:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.49:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.52:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.53:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.54:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.8:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 10:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:tomcat:6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:9.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_guardium:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_guardium:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_provisioning:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_provisioning:2.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.5:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.6:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_audit_and_compliance:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_viewpoint:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_viewpoint:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_message_broker:8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_provisioning:2.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_provisioning:2.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_guardium:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0.1:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.0.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_build_forge:7.1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0.2:*:*:*:development_intelligence:*:*:*
  • OR cpe:/o:ibm:scale_out_network_attached_storage:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_unified_software:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode:6.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_guardium:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20140227
    V
    CVE-2014-0227
    2022-05-20
    oval:org.opensuse.security:def:31710
    P
    Security update for java-1_7_0-openjdk (Important)
    2021-11-24
    oval:org.opensuse.security:def:31257
    P
    Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)
    2021-08-25
    oval:org.opensuse.security:def:31666
    P
    Security update for MozillaFirefox (Important)
    2021-08-17
    oval:org.opensuse.security:def:31644
    P
    Security update for xterm (Important)
    2021-06-18
    oval:org.opensuse.security:def:31200
    P
    Security update for java-1_8_0-openjdk (Moderate)
    2021-06-15
    oval:org.opensuse.security:def:36439
    P
    libcap-devel-2.11-2.17.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:36397
    P
    evolution-2.28.2-0.30.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:31605
    P
    Security update for xorg-x11-server (Important)
    2021-04-14
    oval:org.opensuse.security:def:35290
    P
    Security update for glib2 (Important)
    2021-03-16
    oval:org.opensuse.security:def:31344
    P
    Security update for java-1_7_1-ibm (Important)
    2021-02-18
    oval:org.opensuse.security:def:35233
    P
    Security update for python (Important)
    2020-12-11
    oval:org.opensuse.security:def:35599
    P
    libpython2_6-1_0-2.6.0-8.9.20 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35687
    P
    e2fsprogs-1.41.9-2.7.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35759
    P
    libopenssl0_9_8-0.9.8j-0.26.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35540
    P
    enscript-1.6.4-152.17.55 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35648
    P
    wget-1.11.4-1.15.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35715
    P
    gtk2-2.18.9-0.21.4 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:31108
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:34900
    P
    Security update for dhcp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34912
    P
    Security update for e2fsprogs (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32387
    P
    Security update for tomcat6 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31500
    P
    Security update for python-paramiko (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:35132
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:30891
    P
    Security update for MozillaFirefox
    2020-12-01
    oval:org.opensuse.security:def:30976
    P
    Security update for guestfs
    2020-12-01
    oval:org.opensuse.security:def:34901
    P
    Security update for dhcp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32348
    P
    Security update for sqlite3 (Important)
    2020-12-01
    oval:org.opensuse.security:def:34996
    P
    Security update for glibc (Important)
    2020-12-01
    oval:org.opensuse.security:def:30890
    P
    Security update for Mozilla Firefox
    2020-12-01
    oval:org.opensuse.security:def:31556
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:30902
    P
    Security update for flac
    2020-12-01
    oval:org.opensuse.security:def:35380
    P
    Security update for ntp (Moderate)
    2020-12-01
    oval:org.cisecurity:def:585
    P
    DSA-3530-1 -- tomcat6 -- security update
    2016-07-01
    oval:org.mitre.oval:def:29086
    V
    HP-UX Apache Server Suite running Apache Tomcat or PHP, Remote Denial of Service (DoS) and Other Vulnerabilities
    2015-08-03
    oval:org.mitre.oval:def:29131
    V
    HP-UX Apache Tomcat v7.x, Remote Denial of Service (DoS) and Other Vulnerabilities
    2015-08-03
    oval:com.redhat.rhsa:def:20150983
    P
    RHSA-2015:0983: tomcat security update (Moderate)
    2015-05-12
    oval:com.redhat.rhsa:def:20150991
    P
    RHSA-2015:0991: tomcat6 security and bug fix update (Moderate)
    2015-05-12
    oval:com.ubuntu.xenial:def:201402270000000
    V
    CVE-2014-0227 on Ubuntu 16.04 LTS (xenial) - low.
    2015-02-16
    oval:com.ubuntu.bionic:def:201402270000000
    V
    CVE-2014-0227 on Ubuntu 18.04 LTS (bionic) - low.
    2015-02-15
    oval:com.ubuntu.precise:def:20140227000
    V
    CVE-2014-0227 on Ubuntu 12.04 LTS (precise) - low.
    2015-02-15
    oval:com.ubuntu.trusty:def:20140227000
    V
    CVE-2014-0227 on Ubuntu 14.04 LTS (trusty) - low.
    2015-02-15
    oval:com.ubuntu.artful:def:20140227000
    V
    CVE-2014-0227 on Ubuntu 17.10 (artful) - low.
    2015-02-15
    oval:com.ubuntu.xenial:def:20140227000
    V
    CVE-2014-0227 on Ubuntu 16.04 LTS (xenial) - low.
    2015-02-15
    oval:com.ubuntu.bionic:def:20140227000
    V
    CVE-2014-0227 on Ubuntu 18.04 LTS (bionic) - low.
    2015-02-15
    BACK
    apache tomcat 6.0.0
    apache tomcat 6.0.0 alpha
    apache tomcat 6.0.1
    apache tomcat 6.0.1 alpha
    apache tomcat 6.0.2
    apache tomcat 6.0.2 alpha
    apache tomcat 6.0.2 beta
    apache tomcat 6.0.3
    apache tomcat 6.0.4
    apache tomcat 6.0.4 alpha
    apache tomcat 6.0.5
    apache tomcat 6.0.6
    apache tomcat 6.0.6 alpha
    apache tomcat 6.0.7
    apache tomcat 6.0.7 alpha
    apache tomcat 6.0.7 beta
    apache tomcat 6.0.8
    apache tomcat 6.0.8 alpha
    apache tomcat 6.0.9
    apache tomcat 6.0.9 beta
    apache tomcat 6.0.10
    apache tomcat 6.0.11
    apache tomcat 6.0.12
    apache tomcat 6.0.13
    apache tomcat 6.0.14
    apache tomcat 6.0.15
    apache tomcat 6.0.16
    apache tomcat 6.0.17
    apache tomcat 6.0.18
    apache tomcat 6.0.19
    apache tomcat 6.0.20
    apache tomcat 6.0.24
    apache tomcat 6.0.26
    apache tomcat 6.0.27
    apache tomcat 6.0.28
    apache tomcat 6.0.29
    apache tomcat 6.0.30
    apache tomcat 6.0.31
    apache tomcat 6.0.32
    apache tomcat 6.0.33
    apache tomcat 6.0.35
    apache tomcat 6.0.36
    apache tomcat 6.0.37
    apache tomcat 6.0.39
    apache tomcat 6.0.41
    apache tomcat 7.0.0
    apache tomcat 7.0.0 beta
    apache tomcat 7.0.1
    apache tomcat 7.0.2
    apache tomcat 7.0.2 beta
    apache tomcat 7.0.3
    apache tomcat 7.0.4
    apache tomcat 7.0.4 beta
    apache tomcat 7.0.5
    apache tomcat 7.0.6
    apache tomcat 7.0.7
    apache tomcat 7.0.8
    apache tomcat 7.0.9
    apache tomcat 7.0.10
    apache tomcat 7.0.11
    apache tomcat 7.0.12
    apache tomcat 7.0.13
    apache tomcat 7.0.14
    apache tomcat 7.0.15
    apache tomcat 7.0.16
    apache tomcat 7.0.17
    apache tomcat 7.0.18
    apache tomcat 7.0.19
    apache tomcat 7.0.20
    apache tomcat 7.0.21
    apache tomcat 7.0.22
    apache tomcat 7.0.23
    apache tomcat 7.0.24
    apache tomcat 7.0.25
    apache tomcat 7.0.26
    apache tomcat 7.0.27
    apache tomcat 7.0.28
    apache tomcat 7.0.29
    apache tomcat 7.0.30
    apache tomcat 7.0.31
    apache tomcat 7.0.32
    apache tomcat 7.0.33
    apache tomcat 7.0.34
    apache tomcat 7.0.35
    apache tomcat 7.0.36
    apache tomcat 7.0.37
    apache tomcat 7.0.38
    apache tomcat 7.0.39
    apache tomcat 7.0.40
    apache tomcat 7.0.41
    apache tomcat 7.0.42
    apache tomcat 7.0.43
    apache tomcat 7.0.44
    apache tomcat 7.0.45
    apache tomcat 7.0.46
    apache tomcat 7.0.47
    apache tomcat 7.0.48
    apache tomcat 7.0.49
    apache tomcat 7.0.50
    apache tomcat 7.0.52
    apache tomcat 7.0.53
    apache tomcat 7.0.54
    apache tomcat 8.0.0 rc1
    apache tomcat 8.0.0 rc10
    apache tomcat 8.0.0 rc2
    apache tomcat 8.0.0 rc5
    apache tomcat 8.0.1
    apache tomcat 8.0.3
    apache tomcat 8.0.5
    apache tomcat 8.0.8
    apache tomcat 6
    apache tomcat 7
    apache tomcat 8.0
    ibm cognos business intelligence 8.4.1
    ibm rational doors web access 1.4
    ibm rational doors web access 1.4.0.2
    ibm rational doors web access 1.4.0.3
    ibm cognos tm1 9.5.2
    ibm infosphere guardium 8.2
    ibm infosphere guardium 9.0
    ibm cognos business intelligence 10.2
    ibm qradar security information and event manager 7.1
    ibm cognos tm1 10.1.1
    ibm rational build forge 8.0
    ibm storwize v7000 software 6.1
    ibm storwize v7000 software 6.2
    ibm storwize v7000 software 6.3
    ibm storwize v7000 software 6.4
    ibm storwize v7000 software 7.1
    ibm cognos business intelligence 10.2.1
    ibm smartcloud provisioning 2.1
    ibm smartcloud provisioning 2.1.0.1
    ibm qradar security information and event manager 7.2
    ibm rational reporting 2.0.5
    ibm rational reporting 2.0.6
    ibm cognos tm1 10.2.2
    ibm storwize v7000 software 7.2
    ibm urbancode 6.0
    ibm urbancode 6.1
    ibm urbancode 6.0.1
    ibm urbancode 6.1.0.1
    ibm algo audit and compliance 2.1
    ibm cognos business viewpoint 10.1
    ibm cognos business viewpoint 10.1.1
    ibm rational build forge 8.0.0.1
    ibm rational build forge 8.0.0.2
    ibm websphere message broker 8
    ibm urbancode 6.0.0.1
    ibm urbancode 6.0.1.1
    ibm urbancode 6.0.1.2
    ibm urbancode 6.0.1.3
    ibm algo one 4.9
    ibm algo one 5.0
    ibm websphere cast iron cloud integration 6.1.0.6
    ibm websphere cast iron cloud integration 6.1.0.7
    ibm websphere cast iron cloud integration 6.1.0.8
    ibm websphere cast iron cloud integration 6.1.0.9
    ibm websphere cast iron cloud integration 6.1.0.12
    ibm websphere cast iron cloud integration 6.1.0.15
    ibm websphere cast iron cloud integration 6.3.0.1
    ibm websphere cast iron cloud integration 6.3.0.2
    ibm websphere cast iron cloud integration 6.4.0.0
    ibm websphere cast iron cloud integration 6.4.0.1
    ibm websphere cast iron cloud integration 7.0.0
    ibm websphere cast iron cloud integration 7.0.0.1
    ibm rational build forge 7.1.3
    ibm rational build forge 7.1.3.1
    ibm rational build forge 7.1.3.2
    ibm rational build forge 7.1.3.3
    ibm rational build forge 7.1.3.4
    ibm rational build forge 7.1.3.5
    ibm smartcloud provisioning 2.1.0.2
    ibm smartcloud provisioning 2.1.0.3
    ibm tivoli application dependency discovery manager 7.2
    ibm tivoli application dependency discovery manager 7.2.1
    ibm tivoli application dependency discovery manager 7.2.2
    ibm websphere application server 3.0.0.4 -
    ibm rational collaborative lifecycle management 3.0.1
    ibm rational collaborative lifecycle management 4.0
    ibm infosphere guardium 9.1
    ibm rational license key server 8.1.4
    ibm rational license key server 8.1.4.2
    ibm rational license key server 8.1.4.3
    ibm rational collaborative lifecycle management 3.0.1.6
    ibm rational collaborative lifecycle management 4.0.1
    ibm rational collaborative lifecycle management 4.0.2
    ibm rational collaborative lifecycle management 4.0.3
    ibm rational collaborative lifecycle management 4.0.4
    ibm rational collaborative lifecycle management 4.0.5
    ibm rational collaborative lifecycle management 4.0.6
    ibm rational collaborative lifecycle management 5.0
    ibm algo one 4.7
    ibm algo one 4.7.1
    ibm algo one 4.8
    ibm rational build forge 7.1.2
    ibm rational build forge 7.1.2.1
    ibm rational build forge 7.1.2.2
    ibm rational build forge 7.1.2.3
    ibm rational reporting 5.0
    ibm rational reporting 5.0.1
    ibm rational insight 1.1.1.4
    ibm rational insight 1.1.1.5
    ibm rational collaborative lifecycle management 4.0.7
    ibm rational collaborative lifecycle management 5.0.1
    ibm rational insight 1.1.1.3
    ibm rational test workbench 8.0
    ibm rational test workbench 8.0.0.1
    ibm rational test workbench 8.0.0.2
    ibm rational test workbench 8.0.0.3
    ibm rational test workbench 8.0.1
    ibm rational test workbench 8.0.1.1
    ibm rational test workbench 8.0.1.2
    ibm rational test workbench 8.0.1.3
    ibm rational test workbench 8.0.1.4
    ibm rational test workbench 8.5
    ibm rational test workbench 8.5.0.1
    ibm rational test workbench 8.5.0.2
    ibm urbancode 6.0.1.4
    ibm cognos tm1 10.2
    ibm rational build forge 7.1.3.6
    ibm rational doors web access 1.4.0.4
    ibm rational doors web access 1.4.0.5
    ibm rational doors web access 1.5
    ibm rational doors web access 1.5.0.1
    ibm rational doors web access 9.5
    ibm rational doors web access 9.5.0.1
    ibm rational doors web access 9.5.1
    ibm rational doors web access 9.5.1.1
    ibm rational doors web access 9.5.2
    ibm rational doors web access 9.5.2.1
    ibm rational doors web access 9.6
    ibm rational doors web access 9.6.0.1
    ibm rational doors web access 1.4.0.1
    ibm rational doors web access 9.6.1
    ibm urbancode 6.1.0.2
    ibm urbancode 6.1.0.3
    ibm urbancode 6.1.0.4
    ibm cognos business intelligence 10.2.2
    ibm tivoli application dependency discovery manager 7.3
    ibm urbancode 6.1.0.5
    ibm urbancode 6.1.0.6
    ibm urbancode 6.1.0.7
    ibm urbancode 6.1.1
    ibm urbancode 6.1.1.1
    ibm websphere cast iron cloud integration 7.0.0.2
    ibm rational license key server 8.1.4.4
    ibm rational license key server 8.1.4.5
    ibm rational collaborative lifecycle management 5.0.2
    ibm tivoli common reporting 2.1
    ibm tivoli common reporting 2.1.1
    ibm tivoli common reporting 3.1
    ibm tivoli common reporting 3.1.0.1
    ibm tivoli common reporting 3.1.0.2
    ibm rational license key server 8.1.4.6
    ibm rational insight 1.1.1.6
    ibm storwize v7000 software 7.3
    ibm storwize v7000 software 7.4
    ibm rational reporting 5.0.2
    ibm scale out network attached storage 1.5
    ibm storwize v7000 unified software 1.5
    ibm rational doors web access 9.6.1.1
    ibm rational license key server 8.1.4.7
    ibm urbancode 6.1.1.2
    ibm urbancode 6.1.1.3
    ibm urbancode 6.1.1.4
    ibm urbancode 6.1.0.1
    ibm rational test workbench 8.6
    ibm rational test workbench 8.7
    ibm rational test workbench 8.0.0.4
    ibm rational test workbench 8.0.1.5
    ibm rational test workbench 8.5.0.3
    ibm rational insight 1.1.1.7
    ibm infosphere guardium 10.0
    ibm rational doors web access 9.6.1.3
    ibm rational license key server 8.1.4.8
    ibm tivoli common reporting 3.1.2.0
    ibm rational license key server 8.1.4.9
    ibm rational license key server 8.1.4.1
    ibm sterling b2b integrator 6.0.0.0
    ibm sterling b2b integrator 5.2.0.0