Lookup for vulnerable packages by Package URL.

Purlpkg:apache/tomcat@3.1.1
Typeapache
Namespace
Nametomcat
Version3.1.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.1.3
Latest_non_vulnerable_version11.0.21
Affected_by_vulnerabilities
0
url VCID-1vxs-pv2f-ufam
vulnerability_id VCID-1vxs-pv2f-ufam
summary A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message.
references
0
reference_url http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html
reference_id
reference_type
scores
url http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html
1
reference_url http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme
reference_id
reference_type
scores
url http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2001-0829
reference_id
reference_type
scores
0
value 0.00991
scoring_system epss
scoring_elements 0.76928
published_at 2026-04-16T12:55:00Z
1
value 0.00991
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-04T12:55:00Z
2
value 0.00991
scoring_system epss
scoring_elements 0.76842
published_at 2026-04-07T12:55:00Z
3
value 0.00991
scoring_system epss
scoring_elements 0.76873
published_at 2026-04-08T12:55:00Z
4
value 0.00991
scoring_system epss
scoring_elements 0.76884
published_at 2026-04-09T12:55:00Z
5
value 0.00991
scoring_system epss
scoring_elements 0.76912
published_at 2026-04-11T12:55:00Z
6
value 0.00991
scoring_system epss
scoring_elements 0.76891
published_at 2026-04-12T12:55:00Z
7
value 0.00991
scoring_system epss
scoring_elements 0.76887
published_at 2026-04-13T12:55:00Z
8
value 0.00991
scoring_system epss
scoring_elements 0.76824
published_at 2026-04-01T12:55:00Z
9
value 0.00991
scoring_system epss
scoring_elements 0.76831
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2001-0829
3
reference_url https://web.archive.org/web/20021108153830/http://online.securityfocus.com/bid/2982
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20021108153830/http://online.securityfocus.com/bid/2982
4
reference_url https://web.archive.org/web/20021201182720/http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20021201182720/http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme
5
reference_url https://web.archive.org/web/20061208015126/http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20061208015126/http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html
6
reference_url http://www.securityfocus.com/bid/2982
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/2982
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0829
reference_id CVE-2001-0829
reference_type
scores
0
value Moderate
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0829
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2001-0829
reference_id CVE-2001-0829
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2001-0829
10
reference_url https://github.com/advisories/GHSA-58hj-575g-5j25
reference_id GHSA-58hj-575g-5j25
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-58hj-575g-5j25
fixed_packages
0
url pkg:apache/tomcat@3.2.2
purl pkg:apache/tomcat@3.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-56a7-wfbu-7be8
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.2.2
aliases CVE-2001-0829, GHSA-58hj-575g-5j25
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vxs-pv2f-ufam
1
url VCID-2fb2-r763-ybg5
vulnerability_id VCID-2fb2-r763-ybg5
summary The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-2006
reference_id
reference_type
scores
0
value 0.32359
scoring_system epss
scoring_elements 0.96815
published_at 2026-04-01T12:55:00Z
1
value 0.32359
scoring_system epss
scoring_elements 0.96848
published_at 2026-04-16T12:55:00Z
2
value 0.32359
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-13T12:55:00Z
3
value 0.32359
scoring_system epss
scoring_elements 0.9684
published_at 2026-04-12T12:55:00Z
4
value 0.32359
scoring_system epss
scoring_elements 0.96839
published_at 2026-04-11T12:55:00Z
5
value 0.32359
scoring_system epss
scoring_elements 0.96837
published_at 2026-04-09T12:55:00Z
6
value 0.32359
scoring_system epss
scoring_elements 0.96836
published_at 2026-04-08T12:55:00Z
7
value 0.32359
scoring_system epss
scoring_elements 0.96828
published_at 2026-04-07T12:55:00Z
8
value 0.32359
scoring_system epss
scoring_elements 0.96824
published_at 2026-04-04T12:55:00Z
9
value 0.32359
scoring_system epss
scoring_elements 0.96822
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-2006
1
reference_url https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@<dev.tomcat.apache.org>
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@<dev.tomcat.apache.org>
2
reference_url https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@<dev.tomcat.apache.org>
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@<dev.tomcat.apache.org>
3
reference_url https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@<dev.tomcat.apache.org>
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@<dev.tomcat.apache.org>
4
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
5
reference_url https://web.archive.org/web/20020602051837/http://archives.neohapsis.com/archives/bugtraq/2002-04/0311.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20020602051837/http://archives.neohapsis.com/archives/bugtraq/2002-04/0311.html
6
reference_url https://web.archive.org/web/20021026082659/http://online.securityfocus.com/bid/4575
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20021026082659/http://online.securityfocus.com/bid/4575
7
reference_url https://web.archive.org/web/20030104173336/http://www.iss.net/security_center/static/8932.php
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20030104173336/http://www.iss.net/security_center/static/8932.php
8
reference_url http://tomcat.apache.org/security-4.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://tomcat.apache.org/security-4.html
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2006
reference_id CVE-2002-2006
reference_type
scores
0
value Low
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2006
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2002-2006
reference_id CVE-2002-2006
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2002-2006
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/21412.txt
reference_id CVE-2002-2006;OSVDB-849
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/21412.txt
12
reference_url https://www.securityfocus.com/bid/4575/info
reference_id CVE-2002-2006;OSVDB-849
reference_type exploit
scores
url https://www.securityfocus.com/bid/4575/info
13
reference_url https://github.com/advisories/GHSA-8g4f-fh7f-4fwh
reference_id GHSA-8g4f-fh7f-4fwh
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8g4f-fh7f-4fwh
fixed_packages
0
url pkg:apache/tomcat@3.3.0-a
purl pkg:apache/tomcat@3.3.0-a
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ss8-442a-3baf
1
vulnerability VCID-6yk2-f8d5-cyc3
2
vulnerability VCID-9rpn-zb26-yfdk
3
vulnerability VCID-shq7-jxup-5fgk
4
vulnerability VCID-x6zh-jypa-pbcc
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.3.0-a
1
url pkg:apache/tomcat@4.1.0
purl pkg:apache/tomcat@4.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18j8-kwdv-dyak
1
vulnerability VCID-27q8-96un-9fbk
2
vulnerability VCID-2jnv-segx-zkfd
3
vulnerability VCID-4rcx-xfn5-7kdb
4
vulnerability VCID-6epr-2hbd-skcz
5
vulnerability VCID-6p3e-4u8s-17ep
6
vulnerability VCID-7969-7a8h-zyhh
7
vulnerability VCID-87p8-zvvf-y7dm
8
vulnerability VCID-88v7-kc2y-bfd7
9
vulnerability VCID-99es-8ecb-uub8
10
vulnerability VCID-a9cu-fxqw-xkdg
11
vulnerability VCID-acmu-9eqb-fya5
12
vulnerability VCID-afg3-t31c-ffgp
13
vulnerability VCID-bhq7-d545-27bj
14
vulnerability VCID-bung-pa58-ayfv
15
vulnerability VCID-dcrp-rae1-zfcm
16
vulnerability VCID-fvvt-kufu-k3a6
17
vulnerability VCID-j2sv-62js-xbav
18
vulnerability VCID-mnf8-t3ew-4fgb
19
vulnerability VCID-mp3r-5531-uqg5
20
vulnerability VCID-p45v-qpgg-qqfj
21
vulnerability VCID-peya-mr7j-vugf
22
vulnerability VCID-q7jp-hn4a-4kec
23
vulnerability VCID-qdck-q54n-rkcv
24
vulnerability VCID-qxkf-4ddv-j3b7
25
vulnerability VCID-r1bk-cqhx-ebc5
26
vulnerability VCID-r84b-7ay9-ekcm
27
vulnerability VCID-ssnx-gz8e-87ab
28
vulnerability VCID-tcju-3rvu-wkht
29
vulnerability VCID-v94p-bxm3-akfd
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@4.1.0
aliases CVE-2002-2006, GHSA-8g4f-fh7f-4fwh
risk_score 5.4
exploitability 2.0
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fb2-r763-ybg5
2
url VCID-6ss8-442a-3baf
vulnerability_id VCID-6ss8-442a-3baf
summary Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.
references
0
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
1
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/
reference_id
reference_type
scores
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/
2
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0044
reference_id
reference_type
scores
0
value 0.27285
scoring_system epss
scoring_elements 0.964
published_at 2026-04-13T12:55:00Z
1
value 0.27285
scoring_system epss
scoring_elements 0.96397
published_at 2026-04-12T12:55:00Z
2
value 0.27285
scoring_system epss
scoring_elements 0.96393
published_at 2026-04-09T12:55:00Z
3
value 0.27285
scoring_system epss
scoring_elements 0.9639
published_at 2026-04-08T12:55:00Z
4
value 0.27285
scoring_system epss
scoring_elements 0.96381
published_at 2026-04-07T12:55:00Z
5
value 0.27285
scoring_system epss
scoring_elements 0.96378
published_at 2026-04-04T12:55:00Z
6
value 0.27285
scoring_system epss
scoring_elements 0.96367
published_at 2026-04-01T12:55:00Z
7
value 0.27285
scoring_system epss
scoring_elements 0.96374
published_at 2026-04-02T12:55:00Z
8
value 0.27285
scoring_system epss
scoring_elements 0.96407
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0044
4
reference_url http://secunia.com/advisories/7972
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/7972
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/11196
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/11196
6
reference_url http://www.ciac.org/ciac/bulletins/n-060.shtml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ciac.org/ciac/bulletins/n-060.shtml
7
reference_url http://www.debian.org/security/2003/dsa-246
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2003/dsa-246
8
reference_url http://www.osvdb.org/9203
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.osvdb.org/9203
9
reference_url http://www.osvdb.org/9204
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.osvdb.org/9204
10
reference_url http://www.securityfocus.com/advisories/5111
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/advisories/5111
11
reference_url http://www.securityfocus.com/bid/6720
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/6720
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0044
reference_id CVE-2003-0044
reference_type
scores
0
value Moderate
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0044
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-0044
reference_id CVE-2003-0044
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2003-0044
14
reference_url https://github.com/advisories/GHSA-5hgm-qm5m-5vmw
reference_id GHSA-5hgm-qm5m-5vmw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5hgm-qm5m-5vmw
fixed_packages
0
url pkg:apache/tomcat@3.3.2
purl pkg:apache/tomcat@3.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6p3e-4u8s-17ep
1
vulnerability VCID-7969-7a8h-zyhh
2
vulnerability VCID-kxaa-62td-r3cs
3
vulnerability VCID-x6zh-jypa-pbcc
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.3.2
aliases CVE-2003-0044, GHSA-5hgm-qm5m-5vmw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ss8-442a-3baf
3
url VCID-6yk2-f8d5-cyc3
vulnerability_id VCID-6yk2-f8d5-cyc3
summary Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0043
reference_id
reference_type
scores
0
value 0.02261
scoring_system epss
scoring_elements 0.84543
published_at 2026-04-01T12:55:00Z
1
value 0.02261
scoring_system epss
scoring_elements 0.84641
published_at 2026-04-16T12:55:00Z
2
value 0.02261
scoring_system epss
scoring_elements 0.84621
published_at 2026-04-13T12:55:00Z
3
value 0.02261
scoring_system epss
scoring_elements 0.84625
published_at 2026-04-12T12:55:00Z
4
value 0.02261
scoring_system epss
scoring_elements 0.8463
published_at 2026-04-11T12:55:00Z
5
value 0.02261
scoring_system epss
scoring_elements 0.84611
published_at 2026-04-09T12:55:00Z
6
value 0.02261
scoring_system epss
scoring_elements 0.84605
published_at 2026-04-08T12:55:00Z
7
value 0.02261
scoring_system epss
scoring_elements 0.84584
published_at 2026-04-07T12:55:00Z
8
value 0.02261
scoring_system epss
scoring_elements 0.8458
published_at 2026-04-04T12:55:00Z
9
value 0.02261
scoring_system epss
scoring_elements 0.84558
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0043
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/11195
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/11195
2
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
3
reference_url https://web.archive.org/web/20030804165204/http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20030804165204/http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
4
reference_url https://web.archive.org/web/20030810045410/http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20030810045410/http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
5
reference_url https://web.archive.org/web/20030819144200/http://www.ciac.org/ciac/bulletins/n-060.shtml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20030819144200/http://www.ciac.org/ciac/bulletins/n-060.shtml
6
reference_url https://web.archive.org/web/20131213024606/http://www.securityfocus.com/bid/6722
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20131213024606/http://www.securityfocus.com/bid/6722
7
reference_url https://web.archive.org/web/20140627151430/http://www.securityfocus.com/advisories/5111
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20140627151430/http://www.securityfocus.com/advisories/5111
8
reference_url http://www.debian.org/security/2003/dsa-246
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2003/dsa-246
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0043
reference_id CVE-2003-0043
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0043
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-0043
reference_id CVE-2003-0043
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2003-0043
11
reference_url https://github.com/advisories/GHSA-cvx5-7vc7-rg77
reference_id GHSA-cvx5-7vc7-rg77
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cvx5-7vc7-rg77
fixed_packages
0
url pkg:apache/tomcat@3.3.1-a
purl pkg:apache/tomcat@3.3.1-a
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ss8-442a-3baf
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.3.1-a
aliases CVE-2003-0043, GHSA-cvx5-7vc7-rg77
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yk2-f8d5-cyc3
4
url VCID-9rpn-zb26-yfdk
vulnerability_id VCID-9rpn-zb26-yfdk
summary Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.
references
0
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0045
reference_id
reference_type
scores
0
value 0.01508
scoring_system epss
scoring_elements 0.8122
published_at 2026-04-16T12:55:00Z
1
value 0.01508
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-09T12:55:00Z
2
value 0.01508
scoring_system epss
scoring_elements 0.81203
published_at 2026-04-11T12:55:00Z
3
value 0.01508
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-12T12:55:00Z
4
value 0.01508
scoring_system epss
scoring_elements 0.81183
published_at 2026-04-13T12:55:00Z
5
value 0.01508
scoring_system epss
scoring_elements 0.81119
published_at 2026-04-01T12:55:00Z
6
value 0.01508
scoring_system epss
scoring_elements 0.81127
published_at 2026-04-02T12:55:00Z
7
value 0.01508
scoring_system epss
scoring_elements 0.81151
published_at 2026-04-07T12:55:00Z
8
value 0.01508
scoring_system epss
scoring_elements 0.81178
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0045
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/12102
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/12102
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0045
reference_id CVE-2003-0045
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0045
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-0045
reference_id CVE-2003-0045
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2003-0045
5
reference_url https://github.com/advisories/GHSA-w97x-xfxf-f9xj
reference_id GHSA-w97x-xfxf-f9xj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w97x-xfxf-f9xj
fixed_packages
0
url pkg:apache/tomcat@3.3.1
purl pkg:apache/tomcat@3.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6yk2-f8d5-cyc3
1
vulnerability VCID-shq7-jxup-5fgk
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.3.1
aliases CVE-2003-0045, GHSA-w97x-xfxf-f9xj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9rpn-zb26-yfdk
5
url VCID-a2q2-x613-quav
vulnerability_id VCID-a2q2-x613-quav
summary Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2001-0590
reference_id
reference_type
scores
0
value 0.21835
scoring_system epss
scoring_elements 0.95721
published_at 2026-04-01T12:55:00Z
1
value 0.21835
scoring_system epss
scoring_elements 0.95749
published_at 2026-04-08T12:55:00Z
2
value 0.21835
scoring_system epss
scoring_elements 0.9574
published_at 2026-04-07T12:55:00Z
3
value 0.21835
scoring_system epss
scoring_elements 0.95737
published_at 2026-04-04T12:55:00Z
4
value 0.21835
scoring_system epss
scoring_elements 0.9573
published_at 2026-04-02T12:55:00Z
5
value 0.48298
scoring_system epss
scoring_elements 0.97742
published_at 2026-04-16T12:55:00Z
6
value 0.48298
scoring_system epss
scoring_elements 0.97731
published_at 2026-04-09T12:55:00Z
7
value 0.48298
scoring_system epss
scoring_elements 0.97733
published_at 2026-04-11T12:55:00Z
8
value 0.48298
scoring_system epss
scoring_elements 0.97736
published_at 2026-04-12T12:55:00Z
9
value 0.48298
scoring_system epss
scoring_elements 0.97737
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2001-0590
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/6971
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/6971
3
reference_url https://web.archive.org/web/20020711002734/http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20020711002734/http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html
4
reference_url http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0112-004
reference_id
reference_type
scores
url http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0112-004
5
reference_url http://www.osvdb.org/5580
reference_id
reference_type
scores
url http://www.osvdb.org/5580
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0590
reference_id CVE-2001-0590
reference_type
scores
0
value Moderate
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0590
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2001-0590
reference_id CVE-2001-0590
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2001-0590
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/20716.txt
reference_id CVE-2001-0590;OSVDB-5580
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/20716.txt
10
reference_url https://www.securityfocus.com/bid/2518/info
reference_id CVE-2001-0590;OSVDB-5580
reference_type exploit
scores
url https://www.securityfocus.com/bid/2518/info
11
reference_url https://github.com/advisories/GHSA-x445-mmpw-7r4f
reference_id GHSA-x445-mmpw-7r4f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x445-mmpw-7r4f
fixed_packages
0
url pkg:apache/tomcat@3.2.2
purl pkg:apache/tomcat@3.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-56a7-wfbu-7be8
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.2.2
aliases CVE-2001-0590, GHSA-x445-mmpw-7r4f
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2q2-x613-quav
6
url VCID-edmc-muvz-5ufu
vulnerability_id VCID-edmc-muvz-5ufu
summary The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2000-0760
reference_id
reference_type
scores
0
value 0.42398
scoring_system epss
scoring_elements 0.97464
published_at 2026-04-16T12:55:00Z
1
value 0.42398
scoring_system epss
scoring_elements 0.9745
published_at 2026-04-09T12:55:00Z
2
value 0.42398
scoring_system epss
scoring_elements 0.97452
published_at 2026-04-11T12:55:00Z
3
value 0.42398
scoring_system epss
scoring_elements 0.97454
published_at 2026-04-12T12:55:00Z
4
value 0.42398
scoring_system epss
scoring_elements 0.97455
published_at 2026-04-13T12:55:00Z
5
value 0.42398
scoring_system epss
scoring_elements 0.97441
published_at 2026-04-04T12:55:00Z
6
value 0.42398
scoring_system epss
scoring_elements 0.97442
published_at 2026-04-07T12:55:00Z
7
value 0.42398
scoring_system epss
scoring_elements 0.97448
published_at 2026-04-08T12:55:00Z
8
value 0.43444
scoring_system epss
scoring_elements 0.97487
published_at 2026-04-01T12:55:00Z
9
value 0.43444
scoring_system epss
scoring_elements 0.97493
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2000-0760
1
reference_url http://www.securityfocus.com/bid/1532
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/1532
2
reference_url http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26date%3D2000-07-15%26msg%3DPine.SUN.3.96.1000719235404.24004A-100000%40grex.cyberspace.org
reference_id
reference_type
scores
url http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26date%3D2000-07-15%26msg%3DPine.SUN.3.96.1000719235404.24004A-100000%40grex.cyberspace.org
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0760
reference_id CVE-2000-0760
reference_type
scores
0
value Low
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0760
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2000-0760
reference_id CVE-2000-0760
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2000-0760
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/20132.txt
reference_id CVE-2000-0760;OSVDB-377
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/20132.txt
8
reference_url https://www.securityfocus.com/bid/1532/info
reference_id CVE-2000-0760;OSVDB-377
reference_type exploit
scores
url https://www.securityfocus.com/bid/1532/info
fixed_packages
0
url pkg:apache/tomcat@3.3.0-a
purl pkg:apache/tomcat@3.3.0-a
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ss8-442a-3baf
1
vulnerability VCID-6yk2-f8d5-cyc3
2
vulnerability VCID-9rpn-zb26-yfdk
3
vulnerability VCID-shq7-jxup-5fgk
4
vulnerability VCID-x6zh-jypa-pbcc
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.3.0-a
aliases CVE-2000-0760
risk_score 10.0
exploitability 2.0
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edmc-muvz-5ufu
7
url VCID-shq7-jxup-5fgk
vulnerability_id VCID-shq7-jxup-5fgk
summary Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.
references
0
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
1
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/
reference_id
reference_type
scores
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/
2
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
3
reference_url http://marc.info/?l=bugtraq&m=104394568616290&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=104394568616290&w=2
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0042
reference_id
reference_type
scores
0
value 0.55831
scoring_system epss
scoring_elements 0.98094
published_at 2026-04-12T12:55:00Z
1
value 0.55831
scoring_system epss
scoring_elements 0.98089
published_at 2026-04-09T12:55:00Z
2
value 0.55831
scoring_system epss
scoring_elements 0.98084
published_at 2026-04-07T12:55:00Z
3
value 0.55831
scoring_system epss
scoring_elements 0.98083
published_at 2026-04-04T12:55:00Z
4
value 0.55831
scoring_system epss
scoring_elements 0.98076
published_at 2026-04-01T12:55:00Z
5
value 0.55831
scoring_system epss
scoring_elements 0.9808
published_at 2026-04-02T12:55:00Z
6
value 0.55831
scoring_system epss
scoring_elements 0.981
published_at 2026-04-16T12:55:00Z
7
value 0.55831
scoring_system epss
scoring_elements 0.98095
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0042
5
reference_url http://secunia.com/advisories/7972
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/7972
6
reference_url http://secunia.com/advisories/7977
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/7977
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/11194
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/11194
8
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
9
reference_url http://www.ciac.org/ciac/bulletins/n-060.shtml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ciac.org/ciac/bulletins/n-060.shtml
10
reference_url http://www.debian.org/security/2003/dsa-246
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2003/dsa-246
11
reference_url http://www.securityfocus.com/advisories/5111
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/advisories/5111
12
reference_url http://www.securityfocus.com/bid/6721
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/6721
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0042
reference_id CVE-2003-0042
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0042
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-0042
reference_id CVE-2003-0042
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2003-0042
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22205.txt
reference_id CVE-2003-0042;OSVDB-12232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22205.txt
16
reference_url https://www.securityfocus.com/bid/6721/info
reference_id CVE-2003-0042;OSVDB-12232
reference_type exploit
scores
url https://www.securityfocus.com/bid/6721/info
17
reference_url https://github.com/advisories/GHSA-qfw2-wvrw-mvw4
reference_id GHSA-qfw2-wvrw-mvw4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qfw2-wvrw-mvw4
fixed_packages
0
url pkg:apache/tomcat@3.3.1-a
purl pkg:apache/tomcat@3.3.1-a
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ss8-442a-3baf
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.3.1-a
aliases CVE-2003-0042, GHSA-qfw2-wvrw-mvw4
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shq7-jxup-5fgk
8
url VCID-x6zh-jypa-pbcc
vulnerability_id VCID-x6zh-jypa-pbcc
summary Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0808
reference_id
reference_type
scores
0
value 0.1863
scoring_system epss
scoring_elements 0.95276
published_at 2026-04-16T12:55:00Z
1
value 0.1863
scoring_system epss
scoring_elements 0.95265
published_at 2026-04-12T12:55:00Z
2
value 0.1863
scoring_system epss
scoring_elements 0.95267
published_at 2026-04-13T12:55:00Z
3
value 0.1863
scoring_system epss
scoring_elements 0.95229
published_at 2026-04-01T12:55:00Z
4
value 0.1863
scoring_system epss
scoring_elements 0.95241
published_at 2026-04-02T12:55:00Z
5
value 0.1863
scoring_system epss
scoring_elements 0.95244
published_at 2026-04-04T12:55:00Z
6
value 0.1863
scoring_system epss
scoring_elements 0.95248
published_at 2026-04-07T12:55:00Z
7
value 0.1863
scoring_system epss
scoring_elements 0.95256
published_at 2026-04-08T12:55:00Z
8
value 0.1863
scoring_system epss
scoring_elements 0.95259
published_at 2026-04-09T12:55:00Z
9
value 0.1863
scoring_system epss
scoring_elements 0.95264
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0808
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19681
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19681
2
reference_url http://www.hitachi-support.com/security_e/vuls_e/HS05-006_e/index-e.html
reference_id
reference_type
scores
url http://www.hitachi-support.com/security_e/vuls_e/HS05-006_e/index-e.html
3
reference_url http://www.kb.cert.org/vuls/id/204710
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/204710
4
reference_url http://www.kb.cert.org/vuls/id/JGEI-6A2LEF
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/JGEI-6A2LEF
5
reference_url http://www.securityfocus.com/bid/12795
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12795
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0808
reference_id CVE-2005-0808
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0808
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0808
reference_id CVE-2005-0808
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0808
fixed_packages
aliases CVE-2005-0808
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6zh-jypa-pbcc
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apache/tomcat@3.1.1