Vulnerability Name:

CVE-2014-0230 (CCN-102131)

Assigned:2013-12-03
Published:2014-07-19
Updated:2019-04-15
Summary:Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-399
CWE-770
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2014-0230

Source: MLIST
Type: Vendor Advisory
[tomcat-announce] 20150505 [SECURITY] CVE-2014-0230: Apache Tomcat DoS

Source: CCN
Type: Apache Mailing List, Tue, 05 May 2015 22:53:05 GMT
CVE-2014-0230 Denial of Service

Source: HP
Type: UNKNOWN
HPSBOV03503

Source: HP
Type: UNKNOWN
HPSBUX03561

Source: MLIST
Type: UNKNOWN
[oss-security] 20150409 Apache Tomcat partial file upload DoS CVE-2014-0230

Source: REDHAT
Type: UNKNOWN
RHSA-2015:1621

Source: REDHAT
Type: UNKNOWN
RHSA-2015:1622

Source: REDHAT
Type: UNKNOWN
RHSA-2015:2661

Source: CCN
Type: RHSA-2016-0595
Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:0595

Source: CCN
Type: RHSA-2016-0596
Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:0596

Source: CCN
Type: RHSA-2016-0597
Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:0597

Source: CCN
Type: RHSA-2016-0598
Moderate: jboss-ec2-eap security, bug fix, and enhancement update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:0598

Source: CCN
Type: RHSA-2016-0599
Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:0599

Source: CCN
Type: oss-security Mailing List, Thu, 09 Apr 2015 22:40:07 -0600
Apache Tomcat partial file upload DoS CVE-2014-0230

Source: CONFIRM
Type: UNKNOWN
http://svn.apache.org/viewvc?view=revision&revision=1603770

Source: CONFIRM
Type: UNKNOWN
http://svn.apache.org/viewvc?view=revision&revision=1603775

Source: CONFIRM
Type: UNKNOWN
http://svn.apache.org/viewvc?view=revision&revision=1603779

Source: CCN
Type: Apache SVN Repository
Revision 1603781

Source: CONFIRM
Type: Patch, Vendor Advisory
http://tomcat.apache.org/security-6.html

Source: CONFIRM
Type: Patch, Vendor Advisory
http://tomcat.apache.org/security-7.html

Source: CONFIRM
Type: Patch, Vendor Advisory
http://tomcat.apache.org/security-8.html

Source: DEBIAN
Type: UNKNOWN
DSA-3447

Source: DEBIAN
Type: UNKNOWN
DSA-3530

Source: CCN
Type: IBM Security Bulletin N1020714
Vulnerabilities in Tomcat affect Power Hardware Management Console (CVE-2013-4444, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin S1005258
Apache Tomcat vulnerability affects IBM Storwize V7000 Unified (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin S1005259
Apache Tomcat vulnerability affects IBM SONAS (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin S1005302
Apache Tomcat vulnerabilities affect IBM SAN Volume Controller and Storwize Family (CVE-2014-0227 CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin S1005320
A vulnerability in Open Source Apache Tomcat affects IBM FlashSystem 840, (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin S1005321
A vulnerability in Open Source Apache Tomcat affect the IBM FlashSystem V840, (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin S1005348
A vulnerability in Open Source Apache Tomcat affects the IBM FlashSystem 900, (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1698085
Rational DOORS Web Access is affected by Apache Tomcat vulnerabilities (CVE-2014-0227, CVE-2014-7810, CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1902631
Vulnerability in Apache Tomcat affects Rational Lifecycle Integration Adapter for HP ALM (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1959989
Open Source Apache Tomcat vulnerability - Reported in 04/09/2015 X-Force Report affects IBM Algorithmics One (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1960572
IBM WebSphere Cast Iron Solution is affected by Apache Tomcat vulnerabilities (CVE-2014-0230, CVE-2014-7810,CVE-2014-0227)

Source: CCN
Type: IBM Security Bulletin 1961088
Open Source Apache Tomcat vulnerability and vulnerability in Diffie-Hellman ciphers affects IBM Tivoli Application Dependency Discovery Manager (TADDM) (CVE-2014-0230, CVE-2014-7810, CVE-2015-4000)

Source: CCN
Type: IBM Security Bulletin 1961208
Multiple security vulnerabilities in Open Source Apache Tomcat affect IBM Cognos Business Viewpoint (CVE-2014-0227, CVE-2014-0230, CVE-2014-7810)

Source: CCN
Type: IBM Security Bulletin 1962349
Vulnerability in Apache Tomcat may affect IBM WebSphere Application Server Community Edition (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1962903
Vulnerability in Tomcat affects IBM Cognos Metrics Manager (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1963184
A security vulnerability in Apache Tomcat affects Rational Insight (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1963185
A security vulnerability in Apache Tomcat affects Rational Reporting for Development Intelligence (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1963468
IBM Cognos Business Intelligence Sever 2015Q3 Security Updater : IBM Cognos Business Intelligence Server is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 1963664
Apache Tomcat Vulnerability in Algo Audit and Compliance (CVE-2014-0230 )

Source: CCN
Type: IBM Security Bulletin 1964869
IBM Integration Bus is affected by Apache Tomcat vulnerability (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1966177
IBM Cognos TM1 is affected by multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 1966846
Vulnerabilities in Apache Tomcat affecting Sametime Unified Telephony

Source: CCN
Type: IBM Security Bulletin 1967384
Multiple vulnerability in Product IBM Tivoli Common Reporting (CVE-2014-0230, CVE-2015-4000, CVE-2015-1969, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-2625, CVE-2015-4748, CVE-2015-4749)

Source: CCN
Type: IBM Security Bulletin 1970036
Apache Tomcat as used in IBM QRadar SIEM is vulnerable to Denial of Service Attack. (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 1972376
Multiple Security Vulnerabilities exist in IBM Cognos Express.

Source: CCN
Type: IBM Security Bulletin 1976103
Multiple Security Vulnerabilities in Apache Tomcat affect IBM RLKS Administration and Reporting Tool

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Source: CCN
Type: Oracle Critical Patch Update - July 2015
Oracle Critical Patch Update - July 2015

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Source: BID
Type: UNKNOWN
74475

Source: CCN
Type: BID-74475
Apache Tomcat CVE-2014-0230 Denial of Service Vulnerability

Source: UBUNTU
Type: UNKNOWN
USN-2654-1

Source: UBUNTU
Type: UNKNOWN
USN-2655-1

Source: REDHAT
Type: UNKNOWN
RHSA-2015:2659

Source: REDHAT
Type: UNKNOWN
RHSA-2015:2660

Source: XF
Type: UNKNOWN
apache-tomcat-cve20140230-dos(102131)

Source: CONFIRM
Type: UNKNOWN
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964

Source: CONFIRM
Type: UNKNOWN
https://issues.jboss.org/browse/JWS-219

Source: CONFIRM
Type: UNKNOWN
https://issues.jboss.org/browse/JWS-220

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/

Source: CCN
Type: IBM Security Bulletin 1959294
Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0230)

Source: CCN
Type: IBM Security Bulletin 6495961 (Sterling B2B Integrator)
Apache Tomcat Vulnerabilities Affect IBM Sterling B2B Integrator

Source: CCN
Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator)
Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator

Source: CCN
Type: IBM Security Bulletin 6595755 (Disconnected Log Collector)
IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-0230

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.39:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.41:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.43:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.47:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.48:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.49:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.52:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.53:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.54:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0.8:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:oracle:virtualization:4.63:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:virtualization:4.71:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:virtualization:5.1:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:tomcat:6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_express:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:9.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_express:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:6.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_express:10.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.1:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.3:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.4:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.5:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:2.0.6:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:6:*:el6:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_audit_and_compliance:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_viewpoint:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_viewpoint:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0.1:*:*:*:development_intelligence:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.5.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:1.4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_software:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_reporting:5.0.2:*:*:*:development_intelligence:*:*:*
  • OR cpe:/o:ibm:scale_out_network_attached_storage:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_unified_software:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_test_workbench:8.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_insight:1.1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_doors_web_access:9.6.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_common_reporting:3.1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:integration_bus:10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_express:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_license_key_server:8.1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_enterprise_application_platform:6.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20140230
    V
    CVE-2014-0230
    2022-05-20
    oval:org.opensuse.security:def:31710
    P
    Security update for java-1_7_0-openjdk (Important)
    2021-11-24
    oval:org.opensuse.security:def:31257
    P
    Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) (Important)
    2021-08-25
    oval:org.opensuse.security:def:31666
    P
    Security update for MozillaFirefox (Important)
    2021-08-17
    oval:org.opensuse.security:def:31644
    P
    Security update for xterm (Important)
    2021-06-18
    oval:org.opensuse.security:def:31200
    P
    Security update for java-1_8_0-openjdk (Moderate)
    2021-06-15
    oval:org.opensuse.security:def:36397
    P
    evolution-2.28.2-0.30.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:36439
    P
    libcap-devel-2.11-2.17.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:31605
    P
    Security update for xorg-x11-server (Important)
    2021-04-14
    oval:org.opensuse.security:def:35290
    P
    Security update for glib2 (Important)
    2021-03-16
    oval:org.opensuse.security:def:31344
    P
    Security update for java-1_7_1-ibm (Important)
    2021-02-18
    oval:org.opensuse.security:def:35233
    P
    Security update for python (Important)
    2020-12-11
    oval:org.opensuse.security:def:35648
    P
    wget-1.11.4-1.15.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35715
    P
    gtk2-2.18.9-0.21.4 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35599
    P
    libpython2_6-1_0-2.6.0-8.9.20 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35687
    P
    e2fsprogs-1.41.9-2.7.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35759
    P
    libopenssl0_9_8-0.9.8j-0.26.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35540
    P
    enscript-1.6.4-152.17.55 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:34901
    P
    Security update for dhcp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32348
    P
    Security update for sqlite3 (Important)
    2020-12-01
    oval:org.opensuse.security:def:34996
    P
    Security update for glibc (Important)
    2020-12-01
    oval:org.opensuse.security:def:30890
    P
    Security update for Mozilla Firefox
    2020-12-01
    oval:org.opensuse.security:def:31556
    P
    Security update for xorg-x11-server (Important)
    2020-12-01
    oval:org.opensuse.security:def:30902
    P
    Security update for flac
    2020-12-01
    oval:org.opensuse.security:def:35380
    P
    Security update for ntp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31108
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:34900
    P
    Security update for dhcp (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34912
    P
    Security update for e2fsprogs (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32387
    P
    Security update for tomcat6 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31500
    P
    Security update for python-paramiko (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:35132
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:30891
    P
    Security update for MozillaFirefox
    2020-12-01
    oval:org.opensuse.security:def:30976
    P
    Security update for guestfs
    2020-12-01
    oval:com.redhat.rhsa:def:20162599
    P
    RHSA-2016:2599: tomcat security, bug fix, and enhancement update (Moderate)
    2016-11-03
    oval:org.cisecurity:def:585
    P
    DSA-3530-1 -- tomcat6 -- security update
    2016-07-01
    oval:org.cisecurity:def:489
    V
    HP-UX using Apache Tomcat, Remote Access Restriction Bypass, Arbitrary Code Execution, Execution of Arbitrary Code With Privilege Elevation, Unauthorized Read Access to Files
    2016-05-27
    oval:com.ubuntu.trusty:def:20140230000
    V
    CVE-2014-0230 on Ubuntu 14.04 LTS (trusty) - low.
    2015-06-07
    oval:com.ubuntu.artful:def:20140230000
    V
    CVE-2014-0230 on Ubuntu 17.10 (artful) - low.
    2015-06-07
    oval:com.ubuntu.xenial:def:20140230000
    V
    CVE-2014-0230 on Ubuntu 16.04 LTS (xenial) - low.
    2015-06-07
    oval:com.ubuntu.bionic:def:201402300000000
    V
    CVE-2014-0230 on Ubuntu 18.04 LTS (bionic) - low.
    2015-06-07
    oval:com.ubuntu.bionic:def:20140230000
    V
    CVE-2014-0230 on Ubuntu 18.04 LTS (bionic) - low.
    2015-06-07
    oval:com.ubuntu.xenial:def:201402300000000
    V
    CVE-2014-0230 on Ubuntu 16.04 LTS (xenial) - low.
    2015-06-07
    oval:com.ubuntu.precise:def:20140230000
    V
    CVE-2014-0230 on Ubuntu 12.04 LTS (precise) - low.
    2015-06-07
    BACK
    apache tomcat 6.0.0
    apache tomcat 6.0.0 alpha
    apache tomcat 6.0.1
    apache tomcat 6.0.1 alpha
    apache tomcat 6.0.2
    apache tomcat 6.0.2 alpha
    apache tomcat 6.0.2 beta
    apache tomcat 6.0.3
    apache tomcat 6.0.4
    apache tomcat 6.0.4 alpha
    apache tomcat 6.0.5
    apache tomcat 6.0.6
    apache tomcat 6.0.6 alpha
    apache tomcat 6.0.7
    apache tomcat 6.0.7 alpha
    apache tomcat 6.0.7 beta
    apache tomcat 6.0.8
    apache tomcat 6.0.8 alpha
    apache tomcat 6.0.9
    apache tomcat 6.0.9 beta
    apache tomcat 6.0.10
    apache tomcat 6.0.11
    apache tomcat 6.0.12
    apache tomcat 6.0.13
    apache tomcat 6.0.14
    apache tomcat 6.0.15
    apache tomcat 6.0.16
    apache tomcat 6.0.17
    apache tomcat 6.0.18
    apache tomcat 6.0.19
    apache tomcat 6.0.20
    apache tomcat 6.0.24
    apache tomcat 6.0.26
    apache tomcat 6.0.27
    apache tomcat 6.0.28
    apache tomcat 6.0.29
    apache tomcat 6.0.30
    apache tomcat 6.0.31
    apache tomcat 6.0.32
    apache tomcat 6.0.33
    apache tomcat 6.0.35
    apache tomcat 6.0.36
    apache tomcat 6.0.37
    apache tomcat 6.0.39
    apache tomcat 6.0.41
    apache tomcat 6.0.43
    apache tomcat 7.0.0
    apache tomcat 7.0.0 beta
    apache tomcat 7.0.1
    apache tomcat 7.0.2
    apache tomcat 7.0.2 beta
    apache tomcat 7.0.3
    apache tomcat 7.0.4
    apache tomcat 7.0.4 beta
    apache tomcat 7.0.5
    apache tomcat 7.0.6
    apache tomcat 7.0.7
    apache tomcat 7.0.8
    apache tomcat 7.0.9
    apache tomcat 7.0.10
    apache tomcat 7.0.11
    apache tomcat 7.0.12
    apache tomcat 7.0.13
    apache tomcat 7.0.14
    apache tomcat 7.0.15
    apache tomcat 7.0.16
    apache tomcat 7.0.17
    apache tomcat 7.0.18
    apache tomcat 7.0.19
    apache tomcat 7.0.20
    apache tomcat 7.0.21
    apache tomcat 7.0.22
    apache tomcat 7.0.23
    apache tomcat 7.0.24
    apache tomcat 7.0.25
    apache tomcat 7.0.26
    apache tomcat 7.0.27
    apache tomcat 7.0.28
    apache tomcat 7.0.29
    apache tomcat 7.0.30
    apache tomcat 7.0.31
    apache tomcat 7.0.32
    apache tomcat 7.0.33
    apache tomcat 7.0.34
    apache tomcat 7.0.35
    apache tomcat 7.0.36
    apache tomcat 7.0.37
    apache tomcat 7.0.38
    apache tomcat 7.0.39
    apache tomcat 7.0.40
    apache tomcat 7.0.41
    apache tomcat 7.0.42
    apache tomcat 7.0.43
    apache tomcat 7.0.44
    apache tomcat 7.0.45
    apache tomcat 7.0.46
    apache tomcat 7.0.47
    apache tomcat 7.0.48
    apache tomcat 7.0.49
    apache tomcat 7.0.50
    apache tomcat 7.0.52
    apache tomcat 7.0.53
    apache tomcat 7.0.54
    apache tomcat 8.0.0 rc1
    apache tomcat 8.0.0 rc10
    apache tomcat 8.0.0 rc2
    apache tomcat 8.0.0 rc5
    apache tomcat 8.0.1
    apache tomcat 8.0.3
    apache tomcat 8.0.5
    apache tomcat 8.0.8
    oracle virtualization 4.63
    oracle virtualization 4.71
    oracle virtualization 5.1
    apache tomcat 6
    apache tomcat 7.0.0
    apache tomcat 8.0
    ibm cognos business intelligence 8.4.1
    ibm rational doors web access 1.4
    ibm rational doors web access 1.4.0.2
    ibm rational doors web access 1.4.0.3
    ibm cognos express 9.5
    ibm cognos tm1 9.5.2
    ibm cognos business intelligence 10.1
    ibm cognos business intelligence 10.1.1
    ibm cognos business intelligence 10.2
    ibm qradar security information and event manager 7.1
    ibm cognos express 10.1
    ibm rational insight 1.1
    ibm rational insight 1.1.1
    ibm rational insight 1.1.1.1
    ibm cognos tm1 10.1.1
    ibm storwize v7000 software 6.1
    ibm storwize v7000 software 6.2
    ibm storwize v7000 software 6.3
    ibm storwize v7000 software 6.4
    ibm storwize v7000 software 7.1
    ibm cognos business intelligence 10.2.1
    ibm qradar security information and event manager 7.2
    ibm cognos express 10.2.1
    ibm rational reporting 2.0
    ibm rational reporting 2.0.1
    ibm rational reporting 2.0.3
    ibm rational reporting 2.0.4
    ibm rational reporting 2.0.5
    ibm rational reporting 2.0.6
    redhat jboss enterprise application platform 6
    ibm cognos tm1 10.2.2
    ibm storwize v7000 software 7.2
    ibm algo audit and compliance 2.1
    ibm cognos business viewpoint 10.1
    ibm cognos business viewpoint 10.1.1
    ibm algo one 4.9
    ibm algo one 5.0
    ibm websphere cast iron cloud integration 6.1.0.6
    ibm websphere cast iron cloud integration 6.1.0.7
    ibm websphere cast iron cloud integration 6.1.0.8
    ibm websphere cast iron cloud integration 6.1.0.9
    ibm websphere cast iron cloud integration 6.1.0.12
    ibm websphere cast iron cloud integration 6.1.0.15
    ibm websphere cast iron cloud integration 6.3.0.1
    ibm websphere cast iron cloud integration 6.3.0.2
    ibm websphere cast iron cloud integration 6.4.0.0
    ibm websphere cast iron cloud integration 6.4.0.1
    ibm websphere cast iron cloud integration 7.0.0
    ibm websphere cast iron cloud integration 7.0.0.1
    ibm tivoli application dependency discovery manager 7.2
    ibm tivoli application dependency discovery manager 7.2.1
    ibm tivoli application dependency discovery manager 7.2.2
    ibm websphere application server 3.0.0.4 -
    ibm rational license key server 8.1.4
    ibm rational license key server 8.1.4.2
    ibm rational license key server 8.1.4.3
    ibm algo one 4.7
    ibm algo one 4.7.1
    ibm algo one 4.8
    ibm rational reporting 5.0
    ibm rational reporting 5.0.1
    ibm rational insight 1.1.1.4
    ibm rational insight 1.1.1.5
    ibm algo one 4.9.1
    ibm rational insight 1.1.1.2
    ibm rational insight 1.1.1.3
    ibm rational test workbench 8.0
    ibm rational test workbench 8.0.0.1
    ibm rational test workbench 8.0.0.2
    ibm rational test workbench 8.0.0.3
    ibm rational test workbench 8.0.1
    ibm rational test workbench 8.0.1.1
    ibm rational test workbench 8.0.1.2
    ibm rational test workbench 8.0.1.3
    ibm rational test workbench 8.0.1.4
    ibm rational test workbench 8.5
    ibm rational test workbench 8.5.0.1
    ibm rational test workbench 8.5.0.2
    ibm cognos tm1 10.2
    ibm rational doors web access 1.4.0.4
    ibm rational doors web access 1.4.0.5
    ibm rational doors web access 1.5
    ibm rational doors web access 1.5.0.1
    ibm rational doors web access 9.5
    ibm rational doors web access 9.5.0.1
    ibm rational doors web access 9.5.1
    ibm rational doors web access 9.5.1.1
    ibm rational doors web access 9.5.2
    ibm rational doors web access 9.5.2.1
    ibm rational doors web access 9.6
    ibm rational doors web access 9.6.0.1
    ibm rational doors web access 1.4.0.1
    ibm rational doors web access 9.6.1
    ibm cognos business intelligence 10.2.2
    ibm tivoli application dependency discovery manager 7.3
    ibm websphere cast iron cloud integration 7.0.0.2
    ibm rational license key server 8.1.4.4
    ibm rational license key server 8.1.4.5
    ibm tivoli common reporting 2.1
    ibm tivoli common reporting 2.1.1
    ibm tivoli common reporting 3.1
    ibm tivoli common reporting 3.1.0.1
    ibm tivoli common reporting 3.1.0.2
    ibm rational license key server 8.1.4.6
    ibm rational insight 1.1.1.6
    ibm storwize v7000 software 7.3
    ibm storwize v7000 software 7.4
    ibm rational reporting 5.0.2
    ibm scale out network attached storage 1.5
    ibm storwize v7000 unified software 1.5
    ibm rational doors web access 9.6.1.1
    ibm rational license key server 8.1.4.7
    ibm rational test workbench 8.6
    ibm rational test workbench 8.7
    ibm rational test workbench 8.0.0.4
    ibm rational test workbench 8.0.1.5
    ibm rational test workbench 8.5.0.3
    ibm rational insight 1.1.1.7
    ibm rational doors web access 9.6.1.3
    ibm rational license key server 8.1.4.8
    ibm tivoli common reporting 3.1.2.0
    ibm integration bus 10
    ibm rational license key server 8.1.4.9
    ibm cognos express 10.2.2
    ibm rational license key server 8.1.4.1
    redhat jboss enterprise application platform 6.4.6
    ibm sterling b2b integrator 6.0.0.0
    ibm sterling b2b integrator 5.2.0.0
    ibm sterling b2b integrator 6.0.1.0
    ibm sterling b2b integrator 6.1.0.0