Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.tomcat/tomcat@3.3a
Typemaven
Namespaceorg.apache.tomcat
Nametomcat
Version3.3a
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version9.0.117
Latest_non_vulnerable_version11.0.21
Affected_by_vulnerabilities
0
url VCID-6ss8-442a-3baf
vulnerability_id VCID-6ss8-442a-3baf
summary Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.
references
0
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
1
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/
reference_id
reference_type
scores
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/
2
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0044
reference_id
reference_type
scores
0
value 0.27285
scoring_system epss
scoring_elements 0.96411
published_at 2026-04-18T12:55:00Z
1
value 0.27285
scoring_system epss
scoring_elements 0.96407
published_at 2026-04-16T12:55:00Z
2
value 0.27285
scoring_system epss
scoring_elements 0.964
published_at 2026-04-13T12:55:00Z
3
value 0.27285
scoring_system epss
scoring_elements 0.96397
published_at 2026-04-12T12:55:00Z
4
value 0.27285
scoring_system epss
scoring_elements 0.96393
published_at 2026-04-09T12:55:00Z
5
value 0.27285
scoring_system epss
scoring_elements 0.9639
published_at 2026-04-08T12:55:00Z
6
value 0.27285
scoring_system epss
scoring_elements 0.96381
published_at 2026-04-07T12:55:00Z
7
value 0.27285
scoring_system epss
scoring_elements 0.96378
published_at 2026-04-04T12:55:00Z
8
value 0.27285
scoring_system epss
scoring_elements 0.96367
published_at 2026-04-01T12:55:00Z
9
value 0.27285
scoring_system epss
scoring_elements 0.96374
published_at 2026-04-02T12:55:00Z
10
value 0.27285
scoring_system epss
scoring_elements 0.96413
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0044
4
reference_url http://secunia.com/advisories/7972
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/7972
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/11196
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/11196
6
reference_url http://www.ciac.org/ciac/bulletins/n-060.shtml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ciac.org/ciac/bulletins/n-060.shtml
7
reference_url http://www.debian.org/security/2003/dsa-246
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2003/dsa-246
8
reference_url http://www.osvdb.org/9203
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.osvdb.org/9203
9
reference_url http://www.osvdb.org/9204
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.osvdb.org/9204
10
reference_url http://www.securityfocus.com/advisories/5111
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/advisories/5111
11
reference_url http://www.securityfocus.com/bid/6720
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/6720
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0044
reference_id CVE-2003-0044
reference_type
scores
0
value Moderate
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0044
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-0044
reference_id CVE-2003-0044
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2003-0044
14
reference_url https://github.com/advisories/GHSA-5hgm-qm5m-5vmw
reference_id GHSA-5hgm-qm5m-5vmw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5hgm-qm5m-5vmw
fixed_packages
0
url pkg:maven/org.apache.tomcat/tomcat@3.3.2
purl pkg:maven/org.apache.tomcat/tomcat@3.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6p3e-4u8s-17ep
1
vulnerability VCID-7969-7a8h-zyhh
2
vulnerability VCID-kxaa-62td-r3cs
3
vulnerability VCID-x6zh-jypa-pbcc
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@3.3.2
aliases CVE-2003-0044, GHSA-5hgm-qm5m-5vmw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ss8-442a-3baf
1
url VCID-6yk2-f8d5-cyc3
vulnerability_id VCID-6yk2-f8d5-cyc3
summary Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0043
reference_id
reference_type
scores
0
value 0.02261
scoring_system epss
scoring_elements 0.84644
published_at 2026-04-21T12:55:00Z
1
value 0.02261
scoring_system epss
scoring_elements 0.84543
published_at 2026-04-01T12:55:00Z
2
value 0.02261
scoring_system epss
scoring_elements 0.84558
published_at 2026-04-02T12:55:00Z
3
value 0.02261
scoring_system epss
scoring_elements 0.8458
published_at 2026-04-04T12:55:00Z
4
value 0.02261
scoring_system epss
scoring_elements 0.84584
published_at 2026-04-07T12:55:00Z
5
value 0.02261
scoring_system epss
scoring_elements 0.84605
published_at 2026-04-08T12:55:00Z
6
value 0.02261
scoring_system epss
scoring_elements 0.84611
published_at 2026-04-09T12:55:00Z
7
value 0.02261
scoring_system epss
scoring_elements 0.8463
published_at 2026-04-11T12:55:00Z
8
value 0.02261
scoring_system epss
scoring_elements 0.84625
published_at 2026-04-12T12:55:00Z
9
value 0.02261
scoring_system epss
scoring_elements 0.84621
published_at 2026-04-13T12:55:00Z
10
value 0.02261
scoring_system epss
scoring_elements 0.84641
published_at 2026-04-16T12:55:00Z
11
value 0.02261
scoring_system epss
scoring_elements 0.84642
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0043
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/11195
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/11195
2
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
3
reference_url https://web.archive.org/web/20030804165204/http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20030804165204/http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
4
reference_url https://web.archive.org/web/20030810045410/http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20030810045410/http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
5
reference_url https://web.archive.org/web/20030819144200/http://www.ciac.org/ciac/bulletins/n-060.shtml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20030819144200/http://www.ciac.org/ciac/bulletins/n-060.shtml
6
reference_url https://web.archive.org/web/20131213024606/http://www.securityfocus.com/bid/6722
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20131213024606/http://www.securityfocus.com/bid/6722
7
reference_url https://web.archive.org/web/20140627151430/http://www.securityfocus.com/advisories/5111
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20140627151430/http://www.securityfocus.com/advisories/5111
8
reference_url http://www.debian.org/security/2003/dsa-246
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2003/dsa-246
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0043
reference_id CVE-2003-0043
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0043
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-0043
reference_id CVE-2003-0043
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2003-0043
11
reference_url https://github.com/advisories/GHSA-cvx5-7vc7-rg77
reference_id GHSA-cvx5-7vc7-rg77
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cvx5-7vc7-rg77
fixed_packages
0
url pkg:maven/org.apache.tomcat/tomcat@3.3.1a
purl pkg:maven/org.apache.tomcat/tomcat@3.3.1a
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ss8-442a-3baf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@3.3.1a
aliases CVE-2003-0043, GHSA-cvx5-7vc7-rg77
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yk2-f8d5-cyc3
2
url VCID-9rpn-zb26-yfdk
vulnerability_id VCID-9rpn-zb26-yfdk
summary Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.
references
0
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0045
reference_id
reference_type
scores
0
value 0.01508
scoring_system epss
scoring_elements 0.81219
published_at 2026-04-21T12:55:00Z
1
value 0.01508
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-12T12:55:00Z
2
value 0.01508
scoring_system epss
scoring_elements 0.81183
published_at 2026-04-13T12:55:00Z
3
value 0.01508
scoring_system epss
scoring_elements 0.8122
published_at 2026-04-16T12:55:00Z
4
value 0.01508
scoring_system epss
scoring_elements 0.81221
published_at 2026-04-18T12:55:00Z
5
value 0.01508
scoring_system epss
scoring_elements 0.81119
published_at 2026-04-01T12:55:00Z
6
value 0.01508
scoring_system epss
scoring_elements 0.81127
published_at 2026-04-02T12:55:00Z
7
value 0.01508
scoring_system epss
scoring_elements 0.81151
published_at 2026-04-07T12:55:00Z
8
value 0.01508
scoring_system epss
scoring_elements 0.81178
published_at 2026-04-08T12:55:00Z
9
value 0.01508
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-09T12:55:00Z
10
value 0.01508
scoring_system epss
scoring_elements 0.81203
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0045
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/12102
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/12102
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0045
reference_id CVE-2003-0045
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0045
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-0045
reference_id CVE-2003-0045
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2003-0045
5
reference_url https://github.com/advisories/GHSA-w97x-xfxf-f9xj
reference_id GHSA-w97x-xfxf-f9xj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w97x-xfxf-f9xj
fixed_packages
0
url pkg:maven/org.apache.tomcat/tomcat@3.3.1
purl pkg:maven/org.apache.tomcat/tomcat@3.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6yk2-f8d5-cyc3
1
vulnerability VCID-shq7-jxup-5fgk
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@3.3.1
1
url pkg:maven/org.apache.tomcat/tomcat@3.3.1a
purl pkg:maven/org.apache.tomcat/tomcat@3.3.1a
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ss8-442a-3baf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@3.3.1a
aliases CVE-2003-0045, GHSA-w97x-xfxf-f9xj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9rpn-zb26-yfdk
3
url VCID-shq7-jxup-5fgk
vulnerability_id VCID-shq7-jxup-5fgk
summary Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.
references
0
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a
1
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/
reference_id
reference_type
scores
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/
2
reference_url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
3
reference_url http://marc.info/?l=bugtraq&m=104394568616290&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=104394568616290&w=2
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0042
reference_id
reference_type
scores
0
value 0.55831
scoring_system epss
scoring_elements 0.981
published_at 2026-04-16T12:55:00Z
1
value 0.55831
scoring_system epss
scoring_elements 0.98095
published_at 2026-04-13T12:55:00Z
2
value 0.55831
scoring_system epss
scoring_elements 0.98094
published_at 2026-04-12T12:55:00Z
3
value 0.55831
scoring_system epss
scoring_elements 0.98089
published_at 2026-04-09T12:55:00Z
4
value 0.55831
scoring_system epss
scoring_elements 0.98084
published_at 2026-04-07T12:55:00Z
5
value 0.55831
scoring_system epss
scoring_elements 0.98083
published_at 2026-04-04T12:55:00Z
6
value 0.55831
scoring_system epss
scoring_elements 0.98076
published_at 2026-04-01T12:55:00Z
7
value 0.55831
scoring_system epss
scoring_elements 0.9808
published_at 2026-04-02T12:55:00Z
8
value 0.55831
scoring_system epss
scoring_elements 0.98099
published_at 2026-04-21T12:55:00Z
9
value 0.55831
scoring_system epss
scoring_elements 0.98103
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0042
5
reference_url http://secunia.com/advisories/7972
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/7972
6
reference_url http://secunia.com/advisories/7977
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/7977
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/11194
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/11194
8
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
9
reference_url http://www.ciac.org/ciac/bulletins/n-060.shtml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ciac.org/ciac/bulletins/n-060.shtml
10
reference_url http://www.debian.org/security/2003/dsa-246
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2003/dsa-246
11
reference_url http://www.securityfocus.com/advisories/5111
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/advisories/5111
12
reference_url http://www.securityfocus.com/bid/6721
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/6721
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0042
reference_id CVE-2003-0042
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0042
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-0042
reference_id CVE-2003-0042
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2003-0042
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22205.txt
reference_id CVE-2003-0042;OSVDB-12232
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22205.txt
16
reference_url https://www.securityfocus.com/bid/6721/info
reference_id CVE-2003-0042;OSVDB-12232
reference_type exploit
scores
url https://www.securityfocus.com/bid/6721/info
17
reference_url https://github.com/advisories/GHSA-qfw2-wvrw-mvw4
reference_id GHSA-qfw2-wvrw-mvw4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qfw2-wvrw-mvw4
fixed_packages
0
url pkg:maven/org.apache.tomcat/tomcat@3.3.1a
purl pkg:maven/org.apache.tomcat/tomcat@3.3.1a
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ss8-442a-3baf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@3.3.1a
aliases CVE-2003-0042, GHSA-qfw2-wvrw-mvw4
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shq7-jxup-5fgk
4
url VCID-x6zh-jypa-pbcc
vulnerability_id VCID-x6zh-jypa-pbcc
summary Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0808
reference_id
reference_type
scores
0
value 0.1863
scoring_system epss
scoring_elements 0.95282
published_at 2026-04-21T12:55:00Z
1
value 0.1863
scoring_system epss
scoring_elements 0.95276
published_at 2026-04-16T12:55:00Z
2
value 0.1863
scoring_system epss
scoring_elements 0.95279
published_at 2026-04-18T12:55:00Z
3
value 0.1863
scoring_system epss
scoring_elements 0.95229
published_at 2026-04-01T12:55:00Z
4
value 0.1863
scoring_system epss
scoring_elements 0.95241
published_at 2026-04-02T12:55:00Z
5
value 0.1863
scoring_system epss
scoring_elements 0.95244
published_at 2026-04-04T12:55:00Z
6
value 0.1863
scoring_system epss
scoring_elements 0.95248
published_at 2026-04-07T12:55:00Z
7
value 0.1863
scoring_system epss
scoring_elements 0.95256
published_at 2026-04-08T12:55:00Z
8
value 0.1863
scoring_system epss
scoring_elements 0.95259
published_at 2026-04-09T12:55:00Z
9
value 0.1863
scoring_system epss
scoring_elements 0.95264
published_at 2026-04-11T12:55:00Z
10
value 0.1863
scoring_system epss
scoring_elements 0.95265
published_at 2026-04-12T12:55:00Z
11
value 0.1863
scoring_system epss
scoring_elements 0.95267
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0808
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19681
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19681
2
reference_url http://www.hitachi-support.com/security_e/vuls_e/HS05-006_e/index-e.html
reference_id
reference_type
scores
url http://www.hitachi-support.com/security_e/vuls_e/HS05-006_e/index-e.html
3
reference_url http://www.kb.cert.org/vuls/id/204710
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/204710
4
reference_url http://www.kb.cert.org/vuls/id/JGEI-6A2LEF
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/JGEI-6A2LEF
5
reference_url http://www.securityfocus.com/bid/12795
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12795
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0808
reference_id CVE-2005-0808
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0808
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0808
reference_id CVE-2005-0808
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0808
fixed_packages
aliases CVE-2005-0808
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6zh-jypa-pbcc
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@3.3a