Vulnerability Name: | CVE-2014-0230 (CCN-102131) |
Assigned: | 2013-12-03 |
Published: | 2014-07-19 |
Updated: | 2019-04-15 |
Summary: | Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts. |
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C) 5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-399 CWE-770
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2014-0230
Source: MLIST Type: Vendor Advisory [tomcat-announce] 20150505 [SECURITY] CVE-2014-0230: Apache Tomcat DoS
Source: CCN Type: Apache Mailing List, Tue, 05 May 2015 22:53:05 GMT CVE-2014-0230 Denial of Service
Source: HP Type: UNKNOWN HPSBOV03503
Source: HP Type: UNKNOWN HPSBUX03561
Source: MLIST Type: UNKNOWN [oss-security] 20150409 Apache Tomcat partial file upload DoS CVE-2014-0230
Source: REDHAT Type: UNKNOWN RHSA-2015:1621
Source: REDHAT Type: UNKNOWN RHSA-2015:1622
Source: REDHAT Type: UNKNOWN RHSA-2015:2661
Source: CCN Type: RHSA-2016-0595 Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update
Source: REDHAT Type: UNKNOWN RHSA-2016:0595
Source: CCN Type: RHSA-2016-0596 Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update
Source: REDHAT Type: UNKNOWN RHSA-2016:0596
Source: CCN Type: RHSA-2016-0597 Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update
Source: REDHAT Type: UNKNOWN RHSA-2016:0597
Source: CCN Type: RHSA-2016-0598 Moderate: jboss-ec2-eap security, bug fix, and enhancement update
Source: REDHAT Type: UNKNOWN RHSA-2016:0598
Source: CCN Type: RHSA-2016-0599 Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update
Source: REDHAT Type: UNKNOWN RHSA-2016:0599
Source: CCN Type: oss-security Mailing List, Thu, 09 Apr 2015 22:40:07 -0600 Apache Tomcat partial file upload DoS CVE-2014-0230
Source: CONFIRM Type: UNKNOWN http://svn.apache.org/viewvc?view=revision&revision=1603770
Source: CONFIRM Type: UNKNOWN http://svn.apache.org/viewvc?view=revision&revision=1603775
Source: CONFIRM Type: UNKNOWN http://svn.apache.org/viewvc?view=revision&revision=1603779
Source: CCN Type: Apache SVN Repository Revision 1603781
Source: CONFIRM Type: Patch, Vendor Advisory http://tomcat.apache.org/security-6.html
Source: CONFIRM Type: Patch, Vendor Advisory http://tomcat.apache.org/security-7.html
Source: CONFIRM Type: Patch, Vendor Advisory http://tomcat.apache.org/security-8.html
Source: DEBIAN Type: UNKNOWN DSA-3447
Source: DEBIAN Type: UNKNOWN DSA-3530
Source: CCN Type: IBM Security Bulletin N1020714 Vulnerabilities in Tomcat affect Power Hardware Management Console (CVE-2013-4444, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0227)
Source: CCN Type: IBM Security Bulletin S1005258 Apache Tomcat vulnerability affects IBM Storwize V7000 Unified (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin S1005259 Apache Tomcat vulnerability affects IBM SONAS (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin S1005302 Apache Tomcat vulnerabilities affect IBM SAN Volume Controller and Storwize Family (CVE-2014-0227 CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin S1005320 A vulnerability in Open Source Apache Tomcat affects IBM FlashSystem 840, (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin S1005321 A vulnerability in Open Source Apache Tomcat affect the IBM FlashSystem V840, (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin S1005348 A vulnerability in Open Source Apache Tomcat affects the IBM FlashSystem 900, (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1698085 Rational DOORS Web Access is affected by Apache Tomcat vulnerabilities (CVE-2014-0227, CVE-2014-7810, CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1902631 Vulnerability in Apache Tomcat affects Rational Lifecycle Integration Adapter for HP ALM (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1959989 Open Source Apache Tomcat vulnerability - Reported in 04/09/2015 X-Force Report affects IBM Algorithmics One (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1960572 IBM WebSphere Cast Iron Solution is affected by Apache Tomcat vulnerabilities (CVE-2014-0230, CVE-2014-7810,CVE-2014-0227)
Source: CCN Type: IBM Security Bulletin 1961088 Open Source Apache Tomcat vulnerability and vulnerability in Diffie-Hellman ciphers affects IBM Tivoli Application Dependency Discovery Manager (TADDM) (CVE-2014-0230, CVE-2014-7810, CVE-2015-4000)
Source: CCN Type: IBM Security Bulletin 1961208 Multiple security vulnerabilities in Open Source Apache Tomcat affect IBM Cognos Business Viewpoint (CVE-2014-0227, CVE-2014-0230, CVE-2014-7810)
Source: CCN Type: IBM Security Bulletin 1962349 Vulnerability in Apache Tomcat may affect IBM WebSphere Application Server Community Edition (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1962903 Vulnerability in Tomcat affects IBM Cognos Metrics Manager (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1963184 A security vulnerability in Apache Tomcat affects Rational Insight (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1963185 A security vulnerability in Apache Tomcat affects Rational Reporting for Development Intelligence (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1963468 IBM Cognos Business Intelligence Sever 2015Q3 Security Updater : IBM Cognos Business Intelligence Server is affected by multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 1963664 Apache Tomcat Vulnerability in Algo Audit and Compliance (CVE-2014-0230 )
Source: CCN Type: IBM Security Bulletin 1964869 IBM Integration Bus is affected by Apache Tomcat vulnerability (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1966177 IBM Cognos TM1 is affected by multiple vulnerabilities
Source: CCN Type: IBM Security Bulletin 1966846 Vulnerabilities in Apache Tomcat affecting Sametime Unified Telephony
Source: CCN Type: IBM Security Bulletin 1967384 Multiple vulnerability in Product IBM Tivoli Common Reporting (CVE-2014-0230, CVE-2015-4000, CVE-2015-1969, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-2625, CVE-2015-4748, CVE-2015-4749)
Source: CCN Type: IBM Security Bulletin 1970036 Apache Tomcat as used in IBM QRadar SIEM is vulnerable to Denial of Service Attack. (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 1972376 Multiple Security Vulnerabilities exist in IBM Cognos Express.
Source: CCN Type: IBM Security Bulletin 1976103 Multiple Security Vulnerabilities in Apache Tomcat affect IBM RLKS Administration and Reporting Tool
Source: CONFIRM Type: UNKNOWN http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: CONFIRM Type: UNKNOWN http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
Source: CCN Type: Oracle Critical Patch Update - July 2015 Oracle Critical Patch Update - July 2015
Source: CONFIRM Type: UNKNOWN http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Source: BID Type: UNKNOWN 74475
Source: CCN Type: BID-74475 Apache Tomcat CVE-2014-0230 Denial of Service Vulnerability
Source: UBUNTU Type: UNKNOWN USN-2654-1
Source: UBUNTU Type: UNKNOWN USN-2655-1
Source: REDHAT Type: UNKNOWN RHSA-2015:2659
Source: REDHAT Type: UNKNOWN RHSA-2015:2660
Source: XF Type: UNKNOWN apache-tomcat-cve20140230-dos(102131)
Source: CONFIRM Type: UNKNOWN https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
Source: CONFIRM Type: UNKNOWN https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
Source: CONFIRM Type: UNKNOWN https://issues.jboss.org/browse/JWS-219
Source: CONFIRM Type: UNKNOWN https://issues.jboss.org/browse/JWS-220
Source: MLIST Type: UNKNOWN [tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/
Source: MLIST Type: UNKNOWN [tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/
Source: CCN Type: IBM Security Bulletin 1959294 Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0230)
Source: CCN Type: IBM Security Bulletin 6495961 (Sterling B2B Integrator) Apache Tomcat Vulnerabilities Affect IBM Sterling B2B Integrator
Source: CCN Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator) Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator
Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector) IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities
Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-0230
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.39:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.41:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:6.0.43:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.47:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.48:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.49:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.52:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.53:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.54:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0.8:*:*:*:*:*:*:* Configuration 2: cpe:/a:oracle:virtualization:4.63:*:*:*:*:*:*:*OR cpe:/a:oracle:virtualization:4.71:*:*:*:*:*:*:*OR cpe:/a:oracle:virtualization:5.1:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration CCN 1: cpe:/a:apache:tomcat:6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:8.0:*:*:*:*:*:*:*AND cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:1.4.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:1.4.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_express:9.5:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:9.5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_express:10.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_software:6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_software:6.2:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_software:6.3:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_software:6.4:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_software:7.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_express:10.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_reporting:2.0:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.1:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.3:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.4:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.5:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:2.0.6:*:*:*:development_intelligence:*:*:*OR cpe:/a:redhat:jboss_enterprise_application_platform:6:*:el6:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_software:7.2:*:*:*:*:*:*:*OR cpe:/a:ibm:algo_audit_and_compliance:2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_viewpoint:10.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_viewpoint:10.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:algo_one:4.9:*:*:*:*:*:*:*OR cpe:/a:ibm:algo_one:5.0:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.6:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.7:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.8:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.9:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.12:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.15:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.3.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.3.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.4.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.4.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.3:*:*:*:*:*:*:*OR cpe:/a:ibm:algo_one:4.7:*:*:*:*:*:*:*OR cpe:/a:ibm:algo_one:4.7.1:*:*:*:*:*:*:*OR cpe:/a:ibm:algo_one:4.8:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_reporting:5.0:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_reporting:5.0.1:*:*:*:development_intelligence:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:algo_one:4.9.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_tm1:10.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:1.4.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:1.4.0.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:1.5.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.5.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.5.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.5.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.5.2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.6:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.6.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:1.4.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.6.1:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3:*:*:*:*:*:*:*OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.5:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:2.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.6:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.6:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_software:7.3:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_software:7.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_reporting:5.0.2:*:*:*:development_intelligence:*:*:*OR cpe:/o:ibm:scale_out_network_attached_storage:1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:storwize_v7000_unified_software:1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.6.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.7:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.6:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.7:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.0.4:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.0.1.5:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_test_workbench:8.5.0.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_insight:1.1.1.7:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_doors_web_access:9.6.1.3:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.8:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_common_reporting:3.1.2.0:*:*:*:*:*:*:*OR cpe:/a:ibm:integration_bus:10:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.9:*:*:*:*:*:*:*OR cpe:/a:ibm:cognos_express:10.2.2:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_license_key_server:8.1.4.1:*:*:*:*:*:*:*OR cpe:/a:redhat:jboss_enterprise_application_platform:6.4.6:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.0.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
apache tomcat 6.0.0
apache tomcat 6.0.0 alpha
apache tomcat 6.0.1
apache tomcat 6.0.1 alpha
apache tomcat 6.0.2
apache tomcat 6.0.2 alpha
apache tomcat 6.0.2 beta
apache tomcat 6.0.3
apache tomcat 6.0.4
apache tomcat 6.0.4 alpha
apache tomcat 6.0.5
apache tomcat 6.0.6
apache tomcat 6.0.6 alpha
apache tomcat 6.0.7
apache tomcat 6.0.7 alpha
apache tomcat 6.0.7 beta
apache tomcat 6.0.8
apache tomcat 6.0.8 alpha
apache tomcat 6.0.9
apache tomcat 6.0.9 beta
apache tomcat 6.0.10
apache tomcat 6.0.11
apache tomcat 6.0.12
apache tomcat 6.0.13
apache tomcat 6.0.14
apache tomcat 6.0.15
apache tomcat 6.0.16
apache tomcat 6.0.17
apache tomcat 6.0.18
apache tomcat 6.0.19
apache tomcat 6.0.20
apache tomcat 6.0.24
apache tomcat 6.0.26
apache tomcat 6.0.27
apache tomcat 6.0.28
apache tomcat 6.0.29
apache tomcat 6.0.30
apache tomcat 6.0.31
apache tomcat 6.0.32
apache tomcat 6.0.33
apache tomcat 6.0.35
apache tomcat 6.0.36
apache tomcat 6.0.37
apache tomcat 6.0.39
apache tomcat 6.0.41
apache tomcat 6.0.43
apache tomcat 7.0.0
apache tomcat 7.0.0 beta
apache tomcat 7.0.1
apache tomcat 7.0.2
apache tomcat 7.0.2 beta
apache tomcat 7.0.3
apache tomcat 7.0.4
apache tomcat 7.0.4 beta
apache tomcat 7.0.5
apache tomcat 7.0.6
apache tomcat 7.0.7
apache tomcat 7.0.8
apache tomcat 7.0.9
apache tomcat 7.0.10
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.13
apache tomcat 7.0.14
apache tomcat 7.0.15
apache tomcat 7.0.16
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.19
apache tomcat 7.0.20
apache tomcat 7.0.21
apache tomcat 7.0.22
apache tomcat 7.0.23
apache tomcat 7.0.24
apache tomcat 7.0.25
apache tomcat 7.0.26
apache tomcat 7.0.27
apache tomcat 7.0.28
apache tomcat 7.0.29
apache tomcat 7.0.30
apache tomcat 7.0.31
apache tomcat 7.0.32
apache tomcat 7.0.33
apache tomcat 7.0.34
apache tomcat 7.0.35
apache tomcat 7.0.36
apache tomcat 7.0.37
apache tomcat 7.0.38
apache tomcat 7.0.39
apache tomcat 7.0.40
apache tomcat 7.0.41
apache tomcat 7.0.42
apache tomcat 7.0.43
apache tomcat 7.0.44
apache tomcat 7.0.45
apache tomcat 7.0.46
apache tomcat 7.0.47
apache tomcat 7.0.48
apache tomcat 7.0.49
apache tomcat 7.0.50
apache tomcat 7.0.52
apache tomcat 7.0.53
apache tomcat 7.0.54
apache tomcat 8.0.0 rc1
apache tomcat 8.0.0 rc10
apache tomcat 8.0.0 rc2
apache tomcat 8.0.0 rc5
apache tomcat 8.0.1
apache tomcat 8.0.3
apache tomcat 8.0.5
apache tomcat 8.0.8
oracle virtualization 4.63
oracle virtualization 4.71
oracle virtualization 5.1
apache tomcat 6
apache tomcat 7.0.0
apache tomcat 8.0
ibm cognos business intelligence 8.4.1
ibm rational doors web access 1.4
ibm rational doors web access 1.4.0.2
ibm rational doors web access 1.4.0.3
ibm cognos express 9.5
ibm cognos tm1 9.5.2
ibm cognos business intelligence 10.1
ibm cognos business intelligence 10.1.1
ibm cognos business intelligence 10.2
ibm qradar security information and event manager 7.1
ibm cognos express 10.1
ibm rational insight 1.1
ibm rational insight 1.1.1
ibm rational insight 1.1.1.1
ibm cognos tm1 10.1.1
ibm storwize v7000 software 6.1
ibm storwize v7000 software 6.2
ibm storwize v7000 software 6.3
ibm storwize v7000 software 6.4
ibm storwize v7000 software 7.1
ibm cognos business intelligence 10.2.1
ibm qradar security information and event manager 7.2
ibm cognos express 10.2.1
ibm rational reporting 2.0
ibm rational reporting 2.0.1
ibm rational reporting 2.0.3
ibm rational reporting 2.0.4
ibm rational reporting 2.0.5
ibm rational reporting 2.0.6
redhat jboss enterprise application platform 6
ibm cognos tm1 10.2.2
ibm storwize v7000 software 7.2
ibm algo audit and compliance 2.1
ibm cognos business viewpoint 10.1
ibm cognos business viewpoint 10.1.1
ibm algo one 4.9
ibm algo one 5.0
ibm websphere cast iron cloud integration 6.1.0.6
ibm websphere cast iron cloud integration 6.1.0.7
ibm websphere cast iron cloud integration 6.1.0.8
ibm websphere cast iron cloud integration 6.1.0.9
ibm websphere cast iron cloud integration 6.1.0.12
ibm websphere cast iron cloud integration 6.1.0.15
ibm websphere cast iron cloud integration 6.3.0.1
ibm websphere cast iron cloud integration 6.3.0.2
ibm websphere cast iron cloud integration 6.4.0.0
ibm websphere cast iron cloud integration 6.4.0.1
ibm websphere cast iron cloud integration 7.0.0
ibm websphere cast iron cloud integration 7.0.0.1
ibm tivoli application dependency discovery manager 7.2
ibm tivoli application dependency discovery manager 7.2.1
ibm tivoli application dependency discovery manager 7.2.2
ibm websphere application server 3.0.0.4 -
ibm rational license key server 8.1.4
ibm rational license key server 8.1.4.2
ibm rational license key server 8.1.4.3
ibm algo one 4.7
ibm algo one 4.7.1
ibm algo one 4.8
ibm rational reporting 5.0
ibm rational reporting 5.0.1
ibm rational insight 1.1.1.4
ibm rational insight 1.1.1.5
ibm algo one 4.9.1
ibm rational insight 1.1.1.2
ibm rational insight 1.1.1.3
ibm rational test workbench 8.0
ibm rational test workbench 8.0.0.1
ibm rational test workbench 8.0.0.2
ibm rational test workbench 8.0.0.3
ibm rational test workbench 8.0.1
ibm rational test workbench 8.0.1.1
ibm rational test workbench 8.0.1.2
ibm rational test workbench 8.0.1.3
ibm rational test workbench 8.0.1.4
ibm rational test workbench 8.5
ibm rational test workbench 8.5.0.1
ibm rational test workbench 8.5.0.2
ibm cognos tm1 10.2
ibm rational doors web access 1.4.0.4
ibm rational doors web access 1.4.0.5
ibm rational doors web access 1.5
ibm rational doors web access 1.5.0.1
ibm rational doors web access 9.5
ibm rational doors web access 9.5.0.1
ibm rational doors web access 9.5.1
ibm rational doors web access 9.5.1.1
ibm rational doors web access 9.5.2
ibm rational doors web access 9.5.2.1
ibm rational doors web access 9.6
ibm rational doors web access 9.6.0.1
ibm rational doors web access 1.4.0.1
ibm rational doors web access 9.6.1
ibm cognos business intelligence 10.2.2
ibm tivoli application dependency discovery manager 7.3
ibm websphere cast iron cloud integration 7.0.0.2
ibm rational license key server 8.1.4.4
ibm rational license key server 8.1.4.5
ibm tivoli common reporting 2.1
ibm tivoli common reporting 2.1.1
ibm tivoli common reporting 3.1
ibm tivoli common reporting 3.1.0.1
ibm tivoli common reporting 3.1.0.2
ibm rational license key server 8.1.4.6
ibm rational insight 1.1.1.6
ibm storwize v7000 software 7.3
ibm storwize v7000 software 7.4
ibm rational reporting 5.0.2
ibm scale out network attached storage 1.5
ibm storwize v7000 unified software 1.5
ibm rational doors web access 9.6.1.1
ibm rational license key server 8.1.4.7
ibm rational test workbench 8.6
ibm rational test workbench 8.7
ibm rational test workbench 8.0.0.4
ibm rational test workbench 8.0.1.5
ibm rational test workbench 8.5.0.3
ibm rational insight 1.1.1.7
ibm rational doors web access 9.6.1.3
ibm rational license key server 8.1.4.8
ibm tivoli common reporting 3.1.2.0
ibm integration bus 10
ibm rational license key server 8.1.4.9
ibm cognos express 10.2.2
ibm rational license key server 8.1.4.1
redhat jboss enterprise application platform 6.4.6
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm sterling b2b integrator 6.0.1.0
ibm sterling b2b integrator 6.1.0.0