Vulnerability Name: CVE-2014-0230 (CCN-102131) Assigned: 2013-12-03 Published: 2014-07-19 Updated: 2019-04-15 Summary: Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C )5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-399 CWE-770 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2014-0230 Source: MLIST Type: Vendor Advisory[tomcat-announce] 20150505 [SECURITY] CVE-2014-0230: Apache Tomcat DoS Source: CCN Type: Apache Mailing List, Tue, 05 May 2015 22:53:05 GMTCVE-2014-0230 Denial of Service Source: HP Type: UNKNOWNHPSBOV03503 Source: HP Type: UNKNOWNHPSBUX03561 Source: MLIST Type: UNKNOWN[oss-security] 20150409 Apache Tomcat partial file upload DoS CVE-2014-0230 Source: REDHAT Type: UNKNOWNRHSA-2015:1621 Source: REDHAT Type: UNKNOWNRHSA-2015:1622 Source: REDHAT Type: UNKNOWNRHSA-2015:2661 Source: CCN Type: RHSA-2016-0595Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Source: REDHAT Type: UNKNOWNRHSA-2016:0595 Source: CCN Type: RHSA-2016-0596Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Source: REDHAT Type: UNKNOWNRHSA-2016:0596 Source: CCN Type: RHSA-2016-0597Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Source: REDHAT Type: UNKNOWNRHSA-2016:0597 Source: CCN Type: RHSA-2016-0598Moderate: jboss-ec2-eap security, bug fix, and enhancement update Source: REDHAT Type: UNKNOWNRHSA-2016:0598 Source: CCN Type: RHSA-2016-0599Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Source: REDHAT Type: UNKNOWNRHSA-2016:0599 Source: CCN Type: oss-security Mailing List, Thu, 09 Apr 2015 22:40:07 -0600Apache Tomcat partial file upload DoS CVE-2014-0230 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1603770 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1603775 Source: CONFIRM Type: UNKNOWNhttp://svn.apache.org/viewvc?view=revision&revision=1603779 Source: CCN Type: Apache SVN RepositoryRevision 1603781 Source: CONFIRM Type: Patch, Vendor Advisoryhttp://tomcat.apache.org/security-6.html Source: CONFIRM Type: Patch, Vendor Advisoryhttp://tomcat.apache.org/security-7.html Source: CONFIRM Type: Patch, Vendor Advisoryhttp://tomcat.apache.org/security-8.html Source: DEBIAN Type: UNKNOWNDSA-3447 Source: DEBIAN Type: UNKNOWNDSA-3530 Source: CCN Type: IBM Security Bulletin N1020714Vulnerabilities in Tomcat affect Power Hardware Management Console (CVE-2013-4444, CVE-2014-0075, CVE-2014-0095, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0227) Source: CCN Type: IBM Security Bulletin S1005258Apache Tomcat vulnerability affects IBM Storwize V7000 Unified (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin S1005259Apache Tomcat vulnerability affects IBM SONAS (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin S1005302Apache Tomcat vulnerabilities affect IBM SAN Volume Controller and Storwize Family (CVE-2014-0227 CVE-2014-0230) Source: CCN Type: IBM Security Bulletin S1005320A vulnerability in Open Source Apache Tomcat affects IBM FlashSystem 840, (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin S1005321A vulnerability in Open Source Apache Tomcat affect the IBM FlashSystem V840, (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin S1005348A vulnerability in Open Source Apache Tomcat affects the IBM FlashSystem 900, (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1698085Rational DOORS Web Access is affected by Apache Tomcat vulnerabilities (CVE-2014-0227, CVE-2014-7810, CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1902631Vulnerability in Apache Tomcat affects Rational Lifecycle Integration Adapter for HP ALM (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1959989 Open Source Apache Tomcat vulnerability - Reported in 04/09/2015 X-Force Report affects IBM Algorithmics One (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1960572IBM WebSphere Cast Iron Solution is affected by Apache Tomcat vulnerabilities (CVE-2014-0230, CVE-2014-7810,CVE-2014-0227) Source: CCN Type: IBM Security Bulletin 1961088Open Source Apache Tomcat vulnerability and vulnerability in Diffie-Hellman ciphers affects IBM Tivoli Application Dependency Discovery Manager (TADDM) (CVE-2014-0230, CVE-2014-7810, CVE-2015-4000) Source: CCN Type: IBM Security Bulletin 1961208Multiple security vulnerabilities in Open Source Apache Tomcat affect IBM Cognos Business Viewpoint (CVE-2014-0227, CVE-2014-0230, CVE-2014-7810) Source: CCN Type: IBM Security Bulletin 1962349Vulnerability in Apache Tomcat may affect IBM WebSphere Application Server Community Edition (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1962903Vulnerability in Tomcat affects IBM Cognos Metrics Manager (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1963184A security vulnerability in Apache Tomcat affects Rational Insight (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1963185A security vulnerability in Apache Tomcat affects Rational Reporting for Development Intelligence (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1963468IBM Cognos Business Intelligence Sever 2015Q3 Security Updater : IBM Cognos Business Intelligence Server is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 1963664Apache Tomcat Vulnerability in Algo Audit and Compliance (CVE-2014-0230 ) Source: CCN Type: IBM Security Bulletin 1964869IBM Integration Bus is affected by Apache Tomcat vulnerability (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1966177IBM Cognos TM1 is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 1966846Vulnerabilities in Apache Tomcat affecting Sametime Unified Telephony Source: CCN Type: IBM Security Bulletin 1967384Multiple vulnerability in Product IBM Tivoli Common Reporting (CVE-2014-0230, CVE-2015-4000, CVE-2015-1969, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-2625, CVE-2015-4748, CVE-2015-4749) Source: CCN Type: IBM Security Bulletin 1970036Apache Tomcat as used in IBM QRadar SIEM is vulnerable to Denial of Service Attack. (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 1972376Multiple Security Vulnerabilities exist in IBM Cognos Express. Source: CCN Type: IBM Security Bulletin 1976103Multiple Security Vulnerabilities in Apache Tomcat affect IBM RLKS Administration and Reporting Tool Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Source: CCN Type: Oracle Critical Patch Update - July 2015Oracle Critical Patch Update - July 2015 Source: CONFIRM Type: UNKNOWNhttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html Source: BID Type: UNKNOWN74475 Source: CCN Type: BID-74475Apache Tomcat CVE-2014-0230 Denial of Service Vulnerability Source: UBUNTU Type: UNKNOWNUSN-2654-1 Source: UBUNTU Type: UNKNOWNUSN-2655-1 Source: REDHAT Type: UNKNOWNRHSA-2015:2659 Source: REDHAT Type: UNKNOWNRHSA-2015:2660 Source: XF Type: UNKNOWNapache-tomcat-cve20140230-dos(102131) Source: CONFIRM Type: UNKNOWNhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013 Source: CONFIRM Type: UNKNOWNhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964 Source: CONFIRM Type: UNKNOWNhttps://issues.jboss.org/browse/JWS-219 Source: CONFIRM Type: UNKNOWNhttps://issues.jboss.org/browse/JWS-220 Source: MLIST Type: UNKNOWN[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/ Source: MLIST Type: UNKNOWN[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/ Source: CCN Type: IBM Security Bulletin 1959294Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerability (CVE-2014-0230) Source: CCN Type: IBM Security Bulletin 6495961 (Sterling B2B Integrator)Apache Tomcat Vulnerabilities Affect IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6496741 (Sterling B2B Integrator)Apache Log4j Vulnerabilities Affect IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector)IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2014-0230 Vulnerable Configuration: Configuration 1 :cpe:/a:apache:tomcat:6.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.7:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.9:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:6.0.43:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.8:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.15:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.16:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.17:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.18:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.19:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.20:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.21:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.22:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.23:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.24:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.25:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.26:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.27:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.29:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.30:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.31:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.33:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.34:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.43:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.44:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.45:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.46:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.47:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.48:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.49:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.50:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.52:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.53:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.54:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0.8:*:*:*:*:*:*:* Configuration 2 :cpe:/a:oracle:virtualization:4.63:*:*:*:*:*:*:* OR cpe:/a:oracle:virtualization:4.71:*:*:*:*:*:*:* OR cpe:/a:oracle:virtualization:5.1:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:tomcat:6:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:7.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:tomcat:8.0:*:*:*:*:*:*:* AND cpe:/a:ibm:cognos_business_intelligence:8.4.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.4.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.4.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_express:9.5:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_tm1:9.5.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_express:10.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_tm1:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:6.2:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:6.3:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:6.4:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_express:10.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_reporting:2.0:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.1:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.3:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.4:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.5:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:2.0.6:*:*:*:development_intelligence:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:6:*:el6:*:*:*:*:* OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_audit_and_compliance:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_viewpoint:10.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_viewpoint:10.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_one:4.9:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_one:5.0:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.8:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.9:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.12:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.1.0.15:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.3.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.3.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.4.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:6.4.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_application_server:3.0.0.4:-:community:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.3:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_one:4.7:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_one:4.7.1:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_one:4.8:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_reporting:5.0:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_reporting:5.0.1:*:*:*:development_intelligence:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:algo_one:4.9.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_tm1:10.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.4.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.4.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.5.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:1.4.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:websphere_cast_iron_cloud_integration:7.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.5:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:2.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:3.1.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.6:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_software:7.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_reporting:5.0.2:*:*:*:development_intelligence:*:*:* OR cpe:/o:ibm:scale_out_network_attached_storage:1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:storwize_v7000_unified_software:1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.6.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.0.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_test_workbench:8.5.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_insight:1.1.1.7:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_doors_web_access:9.6.1.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.8:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_common_reporting:3.1.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:integration_bus:10:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.9:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_express:10.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_license_key_server:8.1.4.1:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:6.4.6:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:* Denotes that component is vulnerable Oval Definitions BACK
apache tomcat 6.0.0
apache tomcat 6.0.0 alpha
apache tomcat 6.0.1
apache tomcat 6.0.1 alpha
apache tomcat 6.0.2
apache tomcat 6.0.2 alpha
apache tomcat 6.0.2 beta
apache tomcat 6.0.3
apache tomcat 6.0.4
apache tomcat 6.0.4 alpha
apache tomcat 6.0.5
apache tomcat 6.0.6
apache tomcat 6.0.6 alpha
apache tomcat 6.0.7
apache tomcat 6.0.7 alpha
apache tomcat 6.0.7 beta
apache tomcat 6.0.8
apache tomcat 6.0.8 alpha
apache tomcat 6.0.9
apache tomcat 6.0.9 beta
apache tomcat 6.0.10
apache tomcat 6.0.11
apache tomcat 6.0.12
apache tomcat 6.0.13
apache tomcat 6.0.14
apache tomcat 6.0.15
apache tomcat 6.0.16
apache tomcat 6.0.17
apache tomcat 6.0.18
apache tomcat 6.0.19
apache tomcat 6.0.20
apache tomcat 6.0.24
apache tomcat 6.0.26
apache tomcat 6.0.27
apache tomcat 6.0.28
apache tomcat 6.0.29
apache tomcat 6.0.30
apache tomcat 6.0.31
apache tomcat 6.0.32
apache tomcat 6.0.33
apache tomcat 6.0.35
apache tomcat 6.0.36
apache tomcat 6.0.37
apache tomcat 6.0.39
apache tomcat 6.0.41
apache tomcat 6.0.43
apache tomcat 7.0.0
apache tomcat 7.0.0 beta
apache tomcat 7.0.1
apache tomcat 7.0.2
apache tomcat 7.0.2 beta
apache tomcat 7.0.3
apache tomcat 7.0.4
apache tomcat 7.0.4 beta
apache tomcat 7.0.5
apache tomcat 7.0.6
apache tomcat 7.0.7
apache tomcat 7.0.8
apache tomcat 7.0.9
apache tomcat 7.0.10
apache tomcat 7.0.11
apache tomcat 7.0.12
apache tomcat 7.0.13
apache tomcat 7.0.14
apache tomcat 7.0.15
apache tomcat 7.0.16
apache tomcat 7.0.17
apache tomcat 7.0.18
apache tomcat 7.0.19
apache tomcat 7.0.20
apache tomcat 7.0.21
apache tomcat 7.0.22
apache tomcat 7.0.23
apache tomcat 7.0.24
apache tomcat 7.0.25
apache tomcat 7.0.26
apache tomcat 7.0.27
apache tomcat 7.0.28
apache tomcat 7.0.29
apache tomcat 7.0.30
apache tomcat 7.0.31
apache tomcat 7.0.32
apache tomcat 7.0.33
apache tomcat 7.0.34
apache tomcat 7.0.35
apache tomcat 7.0.36
apache tomcat 7.0.37
apache tomcat 7.0.38
apache tomcat 7.0.39
apache tomcat 7.0.40
apache tomcat 7.0.41
apache tomcat 7.0.42
apache tomcat 7.0.43
apache tomcat 7.0.44
apache tomcat 7.0.45
apache tomcat 7.0.46
apache tomcat 7.0.47
apache tomcat 7.0.48
apache tomcat 7.0.49
apache tomcat 7.0.50
apache tomcat 7.0.52
apache tomcat 7.0.53
apache tomcat 7.0.54
apache tomcat 8.0.0 rc1
apache tomcat 8.0.0 rc10
apache tomcat 8.0.0 rc2
apache tomcat 8.0.0 rc5
apache tomcat 8.0.1
apache tomcat 8.0.3
apache tomcat 8.0.5
apache tomcat 8.0.8
oracle virtualization 4.63
oracle virtualization 4.71
oracle virtualization 5.1
apache tomcat 6
apache tomcat 7.0.0
apache tomcat 8.0
ibm cognos business intelligence 8.4.1
ibm rational doors web access 1.4
ibm rational doors web access 1.4.0.2
ibm rational doors web access 1.4.0.3
ibm cognos express 9.5
ibm cognos tm1 9.5.2
ibm cognos business intelligence 10.1
ibm cognos business intelligence 10.1.1
ibm cognos business intelligence 10.2
ibm qradar security information and event manager 7.1
ibm cognos express 10.1
ibm rational insight 1.1
ibm rational insight 1.1.1
ibm rational insight 1.1.1.1
ibm cognos tm1 10.1.1
ibm storwize v7000 software 6.1
ibm storwize v7000 software 6.2
ibm storwize v7000 software 6.3
ibm storwize v7000 software 6.4
ibm storwize v7000 software 7.1
ibm cognos business intelligence 10.2.1
ibm qradar security information and event manager 7.2
ibm cognos express 10.2.1
ibm rational reporting 2.0
ibm rational reporting 2.0.1
ibm rational reporting 2.0.3
ibm rational reporting 2.0.4
ibm rational reporting 2.0.5
ibm rational reporting 2.0.6
redhat jboss enterprise application platform 6
ibm cognos tm1 10.2.2
ibm storwize v7000 software 7.2
ibm algo audit and compliance 2.1
ibm cognos business viewpoint 10.1
ibm cognos business viewpoint 10.1.1
ibm algo one 4.9
ibm algo one 5.0
ibm websphere cast iron cloud integration 6.1.0.6
ibm websphere cast iron cloud integration 6.1.0.7
ibm websphere cast iron cloud integration 6.1.0.8
ibm websphere cast iron cloud integration 6.1.0.9
ibm websphere cast iron cloud integration 6.1.0.12
ibm websphere cast iron cloud integration 6.1.0.15
ibm websphere cast iron cloud integration 6.3.0.1
ibm websphere cast iron cloud integration 6.3.0.2
ibm websphere cast iron cloud integration 6.4.0.0
ibm websphere cast iron cloud integration 6.4.0.1
ibm websphere cast iron cloud integration 7.0.0
ibm websphere cast iron cloud integration 7.0.0.1
ibm tivoli application dependency discovery manager 7.2
ibm tivoli application dependency discovery manager 7.2.1
ibm tivoli application dependency discovery manager 7.2.2
ibm websphere application server 3.0.0.4 -
ibm rational license key server 8.1.4
ibm rational license key server 8.1.4.2
ibm rational license key server 8.1.4.3
ibm algo one 4.7
ibm algo one 4.7.1
ibm algo one 4.8
ibm rational reporting 5.0
ibm rational reporting 5.0.1
ibm rational insight 1.1.1.4
ibm rational insight 1.1.1.5
ibm algo one 4.9.1
ibm rational insight 1.1.1.2
ibm rational insight 1.1.1.3
ibm rational test workbench 8.0
ibm rational test workbench 8.0.0.1
ibm rational test workbench 8.0.0.2
ibm rational test workbench 8.0.0.3
ibm rational test workbench 8.0.1
ibm rational test workbench 8.0.1.1
ibm rational test workbench 8.0.1.2
ibm rational test workbench 8.0.1.3
ibm rational test workbench 8.0.1.4
ibm rational test workbench 8.5
ibm rational test workbench 8.5.0.1
ibm rational test workbench 8.5.0.2
ibm cognos tm1 10.2
ibm rational doors web access 1.4.0.4
ibm rational doors web access 1.4.0.5
ibm rational doors web access 1.5
ibm rational doors web access 1.5.0.1
ibm rational doors web access 9.5
ibm rational doors web access 9.5.0.1
ibm rational doors web access 9.5.1
ibm rational doors web access 9.5.1.1
ibm rational doors web access 9.5.2
ibm rational doors web access 9.5.2.1
ibm rational doors web access 9.6
ibm rational doors web access 9.6.0.1
ibm rational doors web access 1.4.0.1
ibm rational doors web access 9.6.1
ibm cognos business intelligence 10.2.2
ibm tivoli application dependency discovery manager 7.3
ibm websphere cast iron cloud integration 7.0.0.2
ibm rational license key server 8.1.4.4
ibm rational license key server 8.1.4.5
ibm tivoli common reporting 2.1
ibm tivoli common reporting 2.1.1
ibm tivoli common reporting 3.1
ibm tivoli common reporting 3.1.0.1
ibm tivoli common reporting 3.1.0.2
ibm rational license key server 8.1.4.6
ibm rational insight 1.1.1.6
ibm storwize v7000 software 7.3
ibm storwize v7000 software 7.4
ibm rational reporting 5.0.2
ibm scale out network attached storage 1.5
ibm storwize v7000 unified software 1.5
ibm rational doors web access 9.6.1.1
ibm rational license key server 8.1.4.7
ibm rational test workbench 8.6
ibm rational test workbench 8.7
ibm rational test workbench 8.0.0.4
ibm rational test workbench 8.0.1.5
ibm rational test workbench 8.5.0.3
ibm rational insight 1.1.1.7
ibm rational doors web access 9.6.1.3
ibm rational license key server 8.1.4.8
ibm tivoli common reporting 3.1.2.0
ibm integration bus 10
ibm rational license key server 8.1.4.9
ibm cognos express 10.2.2
ibm rational license key server 8.1.4.1
redhat jboss enterprise application platform 6.4.6
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm sterling b2b integrator 6.0.1.0
ibm sterling b2b integrator 6.1.0.0