Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.tomcat/tomcat@7.0
Typemaven
Namespaceorg.apache.tomcat
Nametomcat
Version7.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version9.0.117
Latest_non_vulnerable_version11.0.21
Affected_by_vulnerabilities
0
url VCID-e2kr-7pmg-gfc9
vulnerability_id VCID-e2kr-7pmg-gfc9
summary Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-09/0075.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://archives.neohapsis.com/archives/bugtraq/2014-09/0075.html
1
reference_url http://marc.info/?l=bugtraq&m=144498216801440&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=bugtraq&m=144498216801440&w=2
2
reference_url http://openwall.com/lists/oss-security/2014/10/24/12
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://openwall.com/lists/oss-security/2014/10/24/12
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4444.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4444.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4444
reference_id
reference_type
scores
0
value 0.09487
scoring_system epss
scoring_elements 0.92823
published_at 2026-04-09T12:55:00Z
1
value 0.09487
scoring_system epss
scoring_elements 0.92819
published_at 2026-04-08T12:55:00Z
2
value 0.09487
scoring_system epss
scoring_elements 0.9281
published_at 2026-04-07T12:55:00Z
3
value 0.09487
scoring_system epss
scoring_elements 0.92812
published_at 2026-04-04T12:55:00Z
4
value 0.09487
scoring_system epss
scoring_elements 0.928
published_at 2026-04-01T12:55:00Z
5
value 0.09487
scoring_system epss
scoring_elements 0.92807
published_at 2026-04-02T12:55:00Z
6
value 0.09487
scoring_system epss
scoring_elements 0.92837
published_at 2026-04-16T12:55:00Z
7
value 0.09487
scoring_system epss
scoring_elements 0.92827
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4444
5
reference_url http://seclists.org/fulldisclosure/2021/Jan/23
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2021/Jan/23
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
8
reference_url https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
9
reference_url https://svn.apache.org/viewvc?view=rev&rev=1470437
reference_id
reference_type
scores
url https://svn.apache.org/viewvc?view=rev&rev=1470437
10
reference_url http://tomcat.apache.org/security-7.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://tomcat.apache.org/security-7.html
11
reference_url http://www.debian.org/security/2016/dsa-3447
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2016/dsa-3447
12
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
13
reference_url http://www.securityfocus.com/bid/69728
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/69728
14
reference_url http://www.securitytracker.com/id/1030834
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securitytracker.com/id/1030834
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1140314
reference_id 1140314
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1140314
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
reference_id CVE-2013-4444
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4444
reference_id CVE-2013-4444
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4444
56
reference_url https://github.com/advisories/GHSA-h6c8-x5r3-pm88
reference_id GHSA-h6c8-x5r3-pm88
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h6c8-x5r3-pm88
fixed_packages
0
url pkg:maven/org.apache.tomcat/tomcat@7.0.40
purl pkg:maven/org.apache.tomcat/tomcat@7.0.40
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18q4-zark-s7a7
1
vulnerability VCID-2sbh-sy57-3uez
2
vulnerability VCID-3n4t-bvb1-5qer
3
vulnerability VCID-3r3s-q21j-c3au
4
vulnerability VCID-4aaa-errb-2qdw
5
vulnerability VCID-4mkw-7haq-pkgn
6
vulnerability VCID-7cpu-h5fr-8ffd
7
vulnerability VCID-95d1-arxd-hkd1
8
vulnerability VCID-9exq-fhv6-bbea
9
vulnerability VCID-a1by-zvtm-akdc
10
vulnerability VCID-a8gk-n8bq-87cp
11
vulnerability VCID-aeeu-fpay-wufz
12
vulnerability VCID-arkn-bca7-hqam
13
vulnerability VCID-dzpn-w4b3-vbcm
14
vulnerability VCID-e7kd-kk57-mkd6
15
vulnerability VCID-eb37-mkxf-7fgw
16
vulnerability VCID-f77q-v5xp-e7dy
17
vulnerability VCID-fyfz-6tr5-2fc7
18
vulnerability VCID-g7bk-891a-uufy
19
vulnerability VCID-gv12-4ruf-kfhq
20
vulnerability VCID-h9ds-trhx-m7aj
21
vulnerability VCID-hmbm-5ysw-77bu
22
vulnerability VCID-jf7u-dvpd-b7f4
23
vulnerability VCID-kagr-74d9-kyhx
24
vulnerability VCID-kgd1-bzst-muh7
25
vulnerability VCID-kwab-3s4q-eka4
26
vulnerability VCID-kyb8-rvyw-s7b1
27
vulnerability VCID-kzzv-rhya-j7dd
28
vulnerability VCID-m1zd-uytj-3bej
29
vulnerability VCID-m2zn-ja8d-7kg8
30
vulnerability VCID-ruuh-g3fa-m7d8
31
vulnerability VCID-tcbc-3kgt-muam
32
vulnerability VCID-tfrs-d458-tfaq
33
vulnerability VCID-vhjj-dnft-kkf4
34
vulnerability VCID-w82a-7kk2-p3f1
35
vulnerability VCID-xf8r-kqxb-7qdy
36
vulnerability VCID-yfx4-4gsc-2kgh
37
vulnerability VCID-ygvw-69am-s7ae
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@7.0.40
aliases CVE-2013-4444, GHSA-h6c8-x5r3-pm88
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e2kr-7pmg-gfc9
1
url VCID-fd9j-6vta-ubbp
vulnerability_id VCID-fd9j-6vta-ubbp
summary Apache Tomcat 7.x before 7.0.11, when web.xml has no security constraints, does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088.
references
0
reference_url http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106%40apache.org%3E
reference_id
reference_type
scores
url http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106%40apache.org%3E
1
reference_url http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106@apache.org%3E
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106@apache.org%3E
2
reference_url http://marc.info/?l=tomcat-user&m=129966773405409&w=2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=tomcat-user&m=129966773405409&w=2
3
reference_url http://markmail.org/message/lzx5273wsgl5pob6
reference_id
reference_type
scores
url http://markmail.org/message/lzx5273wsgl5pob6
4
reference_url http://markmail.org/message/yzmyn44f5aetmm2r
reference_id
reference_type
scores
url http://markmail.org/message/yzmyn44f5aetmm2r
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1419.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1419.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1419
reference_id
reference_type
scores
0
value 0.16103
scoring_system epss
scoring_elements 0.94794
published_at 2026-04-13T12:55:00Z
1
value 0.16103
scoring_system epss
scoring_elements 0.94793
published_at 2026-04-12T12:55:00Z
2
value 0.16103
scoring_system epss
scoring_elements 0.9479
published_at 2026-04-11T12:55:00Z
3
value 0.16103
scoring_system epss
scoring_elements 0.94767
published_at 2026-04-02T12:55:00Z
4
value 0.16103
scoring_system epss
scoring_elements 0.94786
published_at 2026-04-09T12:55:00Z
5
value 0.16103
scoring_system epss
scoring_elements 0.94781
published_at 2026-04-08T12:55:00Z
6
value 0.16103
scoring_system epss
scoring_elements 0.94772
published_at 2026-04-07T12:55:00Z
7
value 0.16103
scoring_system epss
scoring_elements 0.94771
published_at 2026-04-04T12:55:00Z
8
value 0.16103
scoring_system epss
scoring_elements 0.94801
published_at 2026-04-16T12:55:00Z
9
value 0.16103
scoring_system epss
scoring_elements 0.94757
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1419
7
reference_url http://secunia.com/advisories/43684
reference_id
reference_type
scores
url http://secunia.com/advisories/43684
8
reference_url http://securityreason.com/securityalert/8131
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8131
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65971
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65971
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66154
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66154
11
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
12
reference_url https://github.com/apache/tomcat/commit/0ff4905158b77787a7f3aca55c9dec93456665dc
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/0ff4905158b77787a7f3aca55c9dec93456665dc
13
reference_url https://github.com/apache/tomcat/commit/3e5b0455483eed55752047073e92403bfca8d3ec
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/3e5b0455483eed55752047073e92403bfca8d3ec
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1419
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2011-1419
15
reference_url http://svn.apache.org/viewvc?view=revision&revision=1079752
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://svn.apache.org/viewvc?view=revision&revision=1079752
16
reference_url https://web.archive.org/web/20110307182442/http://markmail.org/message/yzmyn44f5aetmm2r
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20110307182442/http://markmail.org/message/yzmyn44f5aetmm2r
17
reference_url https://web.archive.org/web/20110323002552/http://markmail.org/message/lzx5273wsgl5pob6
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20110323002552/http://markmail.org/message/lzx5273wsgl5pob6
18
reference_url https://web.archive.org/web/20170202135440/http://www.securityfocus.com/bid/46685
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170202135440/http://www.securityfocus.com/bid/46685
19
reference_url http://tomcat.apache.org/security-7.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://tomcat.apache.org/security-7.html
20
reference_url http://www.osvdb.org/71027
reference_id
reference_type
scores
url http://www.osvdb.org/71027
21
reference_url http://www.securityfocus.com/bid/46685
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46685
22
reference_url http://www.vupen.com/english/advisories/2011/0563
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0563
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=708955
reference_id 708955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=708955
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
36
reference_url https://github.com/advisories/GHSA-vch7-92vf-jm44
reference_id GHSA-vch7-92vf-jm44
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vch7-92vf-jm44
37
reference_url https://security.gentoo.org/glsa/201206-24
reference_id GLSA-201206-24
reference_type
scores
url https://security.gentoo.org/glsa/201206-24
fixed_packages
0
url pkg:maven/org.apache.tomcat/tomcat@7.0.11
purl pkg:maven/org.apache.tomcat/tomcat@7.0.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5eqm-218u-p7gq
1
vulnerability VCID-d9ys-kxh6-nkgr
2
vulnerability VCID-rhg2-n93w-tqeu
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@7.0.11
aliases CVE-2011-1419, GHSA-vch7-92vf-jm44
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fd9j-6vta-ubbp
2
url VCID-hxj6-mupf-abbc
vulnerability_id VCID-hxj6-mupf-abbc
summary Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3375.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3375
reference_id
reference_type
scores
0
value 0.02015
scoring_system epss
scoring_elements 0.83692
published_at 2026-04-04T12:55:00Z
1
value 0.02015
scoring_system epss
scoring_elements 0.83764
published_at 2026-04-16T12:55:00Z
2
value 0.02015
scoring_system epss
scoring_elements 0.8373
published_at 2026-04-13T12:55:00Z
3
value 0.02015
scoring_system epss
scoring_elements 0.83735
published_at 2026-04-12T12:55:00Z
4
value 0.02015
scoring_system epss
scoring_elements 0.83741
published_at 2026-04-11T12:55:00Z
5
value 0.02015
scoring_system epss
scoring_elements 0.83725
published_at 2026-04-09T12:55:00Z
6
value 0.02015
scoring_system epss
scoring_elements 0.83718
published_at 2026-04-08T12:55:00Z
7
value 0.02015
scoring_system epss
scoring_elements 0.83665
published_at 2026-04-01T12:55:00Z
8
value 0.02015
scoring_system epss
scoring_elements 0.83678
published_at 2026-04-02T12:55:00Z
9
value 0.02015
scoring_system epss
scoring_elements 0.83695
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3375
2
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
3
reference_url https://github.com/apache/tomcat70/commit/9eae334e9492f55a841e6eb7ab302ff11d03ab21
reference_id
reference_type
scores
url https://github.com/apache/tomcat70/commit/9eae334e9492f55a841e6eb7ab302ff11d03ab21
4
reference_url https://github.com/apache/tomcat/commit/9eae334e9492f55a841e6eb7ab302ff11d03ab21
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/9eae334e9492f55a841e6eb7ab302ff11d03ab21
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-3375
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2011-3375
6
reference_url https://svn.apache.org/viewvc?view=rev&rev=1176592
reference_id
reference_type
scores
url https://svn.apache.org/viewvc?view=rev&rev=1176592
7
reference_url https://svn.apache.org/viewvc?view=rev&rev=1185998
reference_id
reference_type
scores
url https://svn.apache.org/viewvc?view=rev&rev=1185998
8
reference_url http://tomcat.apache.org/security-6.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://tomcat.apache.org/security-6.html
9
reference_url http://tomcat.apache.org/security-7.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://tomcat.apache.org/security-7.html
10
reference_url http://www.debian.org/security/2012/dsa-2401
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2012/dsa-2401
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=782624
reference_id 782624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=782624
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3375
reference_id CVE-2011-3375
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3375
13
reference_url https://github.com/advisories/GHSA-rp8h-vr48-4j8p
reference_id GHSA-rp8h-vr48-4j8p
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rp8h-vr48-4j8p
14
reference_url https://security.gentoo.org/glsa/201206-24
reference_id GLSA-201206-24
reference_type
scores
url https://security.gentoo.org/glsa/201206-24
15
reference_url https://access.redhat.com/errata/RHSA-2012:0681
reference_id RHSA-2012:0681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0681
16
reference_url https://access.redhat.com/errata/RHSA-2012:0682
reference_id RHSA-2012:0682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0682
17
reference_url https://usn.ubuntu.com/1359-1/
reference_id USN-1359-1
reference_type
scores
url https://usn.ubuntu.com/1359-1/
fixed_packages
0
url pkg:maven/org.apache.tomcat/tomcat@7.0.22
purl pkg:maven/org.apache.tomcat/tomcat@7.0.22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hhk9-cr54-8fgc
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@7.0.22
aliases CVE-2011-3375, GHSA-rp8h-vr48-4j8p
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxj6-mupf-abbc
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@7.0