Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/4761?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4761?format=api", "vulnerability_id": "VCID-hhkg-mfp5-2kax", "summary": "The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.", "aliases": [ { "alias": "CVE-2007-5342" }, { "alias": "GHSA-w65j-cmqc-37p2" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1455?format=api", "purl": "pkg:apache/tomcat@5.5.26", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a9cu-fxqw-xkdg" }, { "vulnerability": "VCID-acmu-9eqb-fya5" }, { "vulnerability": "VCID-egup-27ub-6uaf" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@5.5.26" }, { "url": "http://public2.vulnerablecode.io/api/packages/1367?format=api", "purl": "pkg:apache/tomcat@6.0.16", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a9cu-fxqw-xkdg" }, { "vulnerability": "VCID-acmu-9eqb-fya5" }, { "vulnerability": "VCID-egup-27ub-6uaf" }, { "vulnerability": "VCID-hves-r5bg-yfes" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@6.0.16" }, { "url": "http://public2.vulnerablecode.io/api/packages/71778?format=api", "purl": "pkg:ebuild/www-servers/tomcat@6.0.16", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/tomcat@6.0.16" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1457?format=api", "purl": "pkg:apache/tomcat@5.5.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-egup-27ub-6uaf" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@5.5.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1459?format=api", "purl": "pkg:apache/tomcat@5.5.25", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7pd9-1r19-73fe" }, { "vulnerability": "VCID-88v7-kc2y-bfd7" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" }, { "vulnerability": "VCID-v94p-bxm3-akfd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@5.5.25" }, { "url": "http://public2.vulnerablecode.io/api/packages/1361?format=api", "purl": "pkg:apache/tomcat@6.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-18q4-zark-s7a7" }, { "vulnerability": "VCID-1k8f-vsg1-k3d6" }, { "vulnerability": "VCID-1qt3-ctae-sfgw" }, { "vulnerability": "VCID-241m-q6vd-kudk" }, { "vulnerability": "VCID-27q8-96un-9fbk" }, { "vulnerability": "VCID-3cr9-g81m-4ugy" }, { "vulnerability": "VCID-3n4t-bvb1-5qer" }, { "vulnerability": "VCID-3r3s-q21j-c3au" }, { "vulnerability": "VCID-4mkw-7haq-pkgn" }, { "vulnerability": "VCID-4rcx-xfn5-7kdb" }, { "vulnerability": "VCID-68fk-4g86-ekbp" }, { "vulnerability": "VCID-6epr-2hbd-skcz" }, { "vulnerability": "VCID-6p3e-4u8s-17ep" }, { "vulnerability": "VCID-7969-7a8h-zyhh" }, { "vulnerability": "VCID-7cpu-h5fr-8ffd" }, { "vulnerability": "VCID-7ej8-5f77-cybb" }, { "vulnerability": "VCID-7kjm-p97s-zuh8" }, { "vulnerability": "VCID-7pd9-1r19-73fe" }, { "vulnerability": "VCID-87p8-zvvf-y7dm" }, { "vulnerability": "VCID-88v7-kc2y-bfd7" }, { "vulnerability": "VCID-95d1-arxd-hkd1" }, { "vulnerability": "VCID-a1by-zvtm-akdc" }, { "vulnerability": "VCID-a9cu-fxqw-xkdg" }, { "vulnerability": "VCID-acmu-9eqb-fya5" }, { "vulnerability": "VCID-bung-pa58-ayfv" }, { "vulnerability": "VCID-d9ys-kxh6-nkgr" }, { "vulnerability": "VCID-dcrp-rae1-zfcm" }, { "vulnerability": "VCID-dhun-hj5q-dfch" }, { "vulnerability": "VCID-egup-27ub-6uaf" }, { "vulnerability": "VCID-f2zy-gq57-ufat" }, { "vulnerability": "VCID-fpuc-fe6m-47c6" }, { "vulnerability": "VCID-g998-xymt-fudu" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-hhk9-cr54-8fgc" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" }, { "vulnerability": "VCID-jf7u-dvpd-b7f4" }, { "vulnerability": "VCID-kagr-74d9-kyhx" }, { "vulnerability": "VCID-kgd1-bzst-muh7" }, { "vulnerability": "VCID-kzzv-rhya-j7dd" }, { "vulnerability": "VCID-m1zd-uytj-3bej" }, { "vulnerability": "VCID-mctd-9zgv-5qgp" }, { "vulnerability": "VCID-mnf8-t3ew-4fgb" }, { "vulnerability": "VCID-mwk8-b5c9-kbb9" }, { "vulnerability": "VCID-n76n-ywja-rbhh" }, { "vulnerability": "VCID-p4dn-y54m-8fd1" }, { "vulnerability": "VCID-p6ch-pc73-b3ck" }, { "vulnerability": "VCID-peya-mr7j-vugf" }, { "vulnerability": "VCID-qdck-q54n-rkcv" }, { "vulnerability": "VCID-quwu-ep21-cyew" }, { "vulnerability": "VCID-qxkf-4ddv-j3b7" }, { "vulnerability": "VCID-r84b-7ay9-ekcm" }, { "vulnerability": "VCID-su1y-2bxh-9qe2" }, { "vulnerability": "VCID-tcbc-3kgt-muam" }, { "vulnerability": "VCID-tcju-3rvu-wkht" }, { "vulnerability": "VCID-tfn5-6ckq-wyce" }, { "vulnerability": "VCID-tfrs-d458-tfaq" }, { "vulnerability": "VCID-twh8-87va-juf9" }, { "vulnerability": "VCID-v94p-bxm3-akfd" }, { "vulnerability": "VCID-vd1s-m27a-8ucc" }, { "vulnerability": "VCID-vm4b-26sq-tfev" }, { "vulnerability": "VCID-w82a-7kk2-p3f1" }, { "vulnerability": "VCID-wsn2-pd9b-b3g8" }, { "vulnerability": "VCID-xf8r-kqxb-7qdy" }, { "vulnerability": "VCID-ygvw-69am-s7ae" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@6.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1417?format=api", "purl": "pkg:apache/tomcat@6.0.15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7pd9-1r19-73fe" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" }, { "vulnerability": "VCID-t9y6-suc2-2kcg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@6.0.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/1458?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat@5.5.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-egup-27ub-6uaf" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@5.5.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/1460?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat@5.5.25", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7pd9-1r19-73fe" }, { "vulnerability": "VCID-88v7-kc2y-bfd7" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" }, { "vulnerability": "VCID-v94p-bxm3-akfd" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@5.5.25" }, { "url": "http://public2.vulnerablecode.io/api/packages/1364?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat@6.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-12du-1vyt-bkgx" }, { "vulnerability": "VCID-18q4-zark-s7a7" }, { "vulnerability": "VCID-1k8f-vsg1-k3d6" }, { "vulnerability": "VCID-1qt3-ctae-sfgw" }, { "vulnerability": "VCID-1v6c-f56v-hqh1" }, { "vulnerability": "VCID-241m-q6vd-kudk" }, { "vulnerability": "VCID-27q8-96un-9fbk" }, { "vulnerability": "VCID-3cr9-g81m-4ugy" }, { "vulnerability": "VCID-3n4t-bvb1-5qer" }, { "vulnerability": "VCID-3r3s-q21j-c3au" }, { "vulnerability": "VCID-4mkw-7haq-pkgn" }, { "vulnerability": "VCID-4rcx-xfn5-7kdb" }, { "vulnerability": "VCID-68fk-4g86-ekbp" }, { "vulnerability": "VCID-6epr-2hbd-skcz" }, { "vulnerability": "VCID-6p3e-4u8s-17ep" }, { "vulnerability": "VCID-7969-7a8h-zyhh" }, { "vulnerability": "VCID-7cpu-h5fr-8ffd" }, { "vulnerability": "VCID-7ej8-5f77-cybb" }, { "vulnerability": "VCID-7kjm-p97s-zuh8" }, { "vulnerability": "VCID-7pd9-1r19-73fe" }, { "vulnerability": "VCID-87p8-zvvf-y7dm" }, { "vulnerability": "VCID-88v7-kc2y-bfd7" }, { "vulnerability": "VCID-8ebv-6941-jqdy" }, { "vulnerability": "VCID-95d1-arxd-hkd1" }, { "vulnerability": "VCID-a1by-zvtm-akdc" }, { "vulnerability": "VCID-a9cu-fxqw-xkdg" }, { "vulnerability": "VCID-acmu-9eqb-fya5" }, { "vulnerability": "VCID-bung-pa58-ayfv" }, { "vulnerability": "VCID-d9ys-kxh6-nkgr" }, { "vulnerability": "VCID-dcrp-rae1-zfcm" }, { "vulnerability": "VCID-dhun-hj5q-dfch" }, { "vulnerability": "VCID-egup-27ub-6uaf" }, { "vulnerability": "VCID-egye-da2v-4ybh" }, { "vulnerability": "VCID-f2zy-gq57-ufat" }, { "vulnerability": "VCID-fpuc-fe6m-47c6" }, { "vulnerability": "VCID-g7eg-s99s-xqe7" }, { "vulnerability": "VCID-g998-xymt-fudu" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-hhk9-cr54-8fgc" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" }, { "vulnerability": "VCID-jau7-gfz8-dkfa" }, { "vulnerability": "VCID-jf7u-dvpd-b7f4" }, { "vulnerability": "VCID-jtg7-217a-qqhk" }, { "vulnerability": "VCID-kagr-74d9-kyhx" }, { "vulnerability": "VCID-kgd1-bzst-muh7" }, { "vulnerability": "VCID-kzzv-rhya-j7dd" }, { "vulnerability": "VCID-m1zd-uytj-3bej" }, { "vulnerability": "VCID-mctd-9zgv-5qgp" }, { "vulnerability": "VCID-mnf8-t3ew-4fgb" }, { "vulnerability": "VCID-mwk8-b5c9-kbb9" }, { "vulnerability": "VCID-n76n-ywja-rbhh" }, { "vulnerability": "VCID-p4dn-y54m-8fd1" }, { "vulnerability": "VCID-p6ch-pc73-b3ck" }, { "vulnerability": "VCID-peya-mr7j-vugf" }, { "vulnerability": "VCID-qdck-q54n-rkcv" }, { "vulnerability": "VCID-quwu-ep21-cyew" }, { "vulnerability": "VCID-qxkf-4ddv-j3b7" }, { "vulnerability": "VCID-r5rc-rdd9-bfbk" }, { "vulnerability": "VCID-r84b-7ay9-ekcm" }, { "vulnerability": "VCID-rrdj-ssn7-zfdj" }, { "vulnerability": "VCID-rwvj-tq6x-2ubs" }, { "vulnerability": "VCID-su1y-2bxh-9qe2" }, { "vulnerability": "VCID-t9y6-suc2-2kcg" }, { "vulnerability": "VCID-ta1m-dh8x-nubc" }, { "vulnerability": "VCID-tcbc-3kgt-muam" }, { "vulnerability": "VCID-tcju-3rvu-wkht" }, { "vulnerability": "VCID-tfn5-6ckq-wyce" }, { "vulnerability": "VCID-tfrs-d458-tfaq" }, { "vulnerability": "VCID-twh8-87va-juf9" }, { "vulnerability": "VCID-v94p-bxm3-akfd" }, { "vulnerability": "VCID-vd1s-m27a-8ucc" }, { "vulnerability": "VCID-vm4b-26sq-tfev" }, { "vulnerability": "VCID-w82a-7kk2-p3f1" }, { "vulnerability": "VCID-wsn2-pd9b-b3g8" }, { "vulnerability": "VCID-xf8r-kqxb-7qdy" }, { "vulnerability": "VCID-ygvw-69am-s7ae" }, { "vulnerability": "VCID-zbbr-wded-9ffj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1418?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat@6.0.15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7pd9-1r19-73fe" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" }, { "vulnerability": "VCID-t9y6-suc2-2kcg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/50265?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat-juli@5.5.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat-juli@5.5.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/50266?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat-juli@5.5.25", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat-juli@5.5.25" }, { "url": "http://public2.vulnerablecode.io/api/packages/50267?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat-juli@6.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat-juli@6.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/50268?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat-juli@6.0.15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat-juli@6.0.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/128849?format=api", "purl": "pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glassfish-jaf@1.1.0-0jpp.ep1.12.el5%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/128863?format=api", "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128862?format=api", "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glassfish-javamail@1.4.0-0jpp.ep1.10%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128848?format=api", "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.2%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128855?format=api", "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.4.el5?arch=2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glassfish-jaxb@2.1.4-1jpp.ep1.4.el5%3Farch=2" }, { "url": "http://public2.vulnerablecode.io/api/packages/128879?format=api", "purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128880?format=api", "purl": "pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glassfish-jaxws@2.1.1-1jpp.ep1.3%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128872?format=api", "purl": "pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glassfish-jstl@1.2.0-0jpp.ep1.10%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128852?format=api", "purl": "pkg:rpm/redhat/hibernate3@1:3.2.4-1.SP1_CP04.0jpp.ep1.3?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hibernate3@1:3.2.4-1.SP1_CP04.0jpp.ep1.3%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128856?format=api", "purl": "pkg:rpm/redhat/hibernate3@1:3.2.4-1.SP1_CP04.0jpp.ep1.3?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hibernate3@1:3.2.4-1.SP1_CP04.0jpp.ep1.3%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128885?format=api", "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128884?format=api", "purl": "pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hibernate3-annotations@3.2.1-4.GA_CP02.1jpp.ep1.7.el5%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/128886?format=api", "purl": "pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hibernate3-commons-annotations@0.0.0-1.1jpp.ep1.1%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128861?format=api", "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hibernate3-entitymanager@3.2.1-2.GA_CP03.1jpp.ep1.9%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128847?format=api", "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128850?format=api", "purl": "pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/hibernate3-validator@0.0.0-1.1jpp.ep1.1%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128869?format=api", "purl": "pkg:rpm/redhat/javassist@3.8.0-1.ep1?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/javassist@3.8.0-1.ep1%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128865?format=api", "purl": "pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/javassist@3.8.0-1jpp.ep1.2%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128851?format=api", "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128853?format=api", "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-aop@1.5.5-2.CP02.0jpp.ep1.2%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128883?format=api", "purl": "pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossas@4.2.0-3.GA_CP04.ep1.8%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128876?format=api", "purl": "pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5?arch=6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossas@4.2.0-4.GA_CP04.ep1.7.el5%3Farch=6" }, { "url": "http://public2.vulnerablecode.io/api/packages/128881?format=api", "purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128871?format=api", "purl": "pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5?arch=2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossas@4.3.0-2.GA_CP02.ep1.10.el5%3Farch=2" }, { "url": "http://public2.vulnerablecode.io/api/packages/128867?format=api", "purl": "pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-jaxr@1.2.0-SP1.0jpp.ep1.4%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128845?format=api", "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128846?format=api", "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-messaging@1.4.0-1.SP3_CP03.0jpp.ep1.3%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128858?format=api", "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.1%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128887?format=api", "purl": "pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-remoting@2.2.2-3.SP9.0jpp.ep1.2%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128868?format=api", "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.9%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128877?format=api", "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.10%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128859?format=api", "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.7.el5%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/128882?format=api", "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.10%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128854?format=api", "purl": "pkg:rpm/redhat/jbossts@1:4.2.3-1.SP5_CP02.1jpp.ep1.1?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossts@1:4.2.3-1.SP5_CP02.1jpp.ep1.1%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128892?format=api", "purl": "pkg:rpm/redhat/jbossts@1:4.2.3-1.SP5_CP02.1jpp.ep1.2?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossts@1:4.2.3-1.SP5_CP02.1jpp.ep1.2%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128860?format=api", "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128864?format=api", "purl": "pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossweb@2.0.0-4.CP06.0jpp.ep1.1%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128878?format=api", "purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128857?format=api", "purl": "pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el5?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossws@2.0.1-2.SP2_CP03.0jpp.ep1.1.el5%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/128875?format=api", "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128873?format=api", "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossws-common@1.0.0-1.GA_CP01.0jpp.ep1.3%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128888?format=api", "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128890?format=api", "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossws-framework@2.0.1-0jpp.ep1.11%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128866?format=api", "purl": "pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5?arch=1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbossxb@1.0.0-2.SP3.0jpp.ep1.3.el5%3Farch=1" }, { "url": "http://public2.vulnerablecode.io/api/packages/128891?format=api", "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.3%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128870?format=api", "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-eap-docs@4.2.0-4.GA_CP04.ep1.5%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/128889?format=api", "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-2.GA_CP02.ep1.6?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-eap-docs@4.3.0-2.GA_CP02.ep1.6%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/128874?format=api", "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9?arch=el4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6h78-yqz1-xkbw" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-eap-docs@4.3.0-3.GA_CP02.ep1.9%3Farch=el4" }, { "url": "http://public2.vulnerablecode.io/api/packages/129505?format=api", "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3?arch=el5_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88v7-kc2y-bfd7" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat5@5.5.23-0jpp.3.0.3%3Farch=el5_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/128940?format=api", "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh?arch=9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88v7-kc2y-bfd7" }, { "vulnerability": "VCID-a9cu-fxqw-xkdg" }, { "vulnerability": "VCID-acmu-9eqb-fya5" }, { "vulnerability": "VCID-egup-27ub-6uaf" }, { "vulnerability": "VCID-hhkg-mfp5-2kax" }, { "vulnerability": "VCID-rwvj-tq6x-2ubs" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh%3Farch=9" } ], "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5342.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95178", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95172", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95168", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95161", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95158", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95181", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.18121", "scoring_system": "epss", "scoring_elements": "0.95189", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5342" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200804-10.xml", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://security.gentoo.org/glsa/glsa-200804-10.xml" }, { "reference_url": "http://securityreason.com/securityalert/3485", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://securityreason.com/securityalert/3485" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39201" }, { "reference_url": "https://github.com/apache/tomcat/tree/main/java/org/apache/juli", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/tree/main/java/org/apache/juli" }, { "reference_url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10417" }, { "reference_url": "http://support.apple.com/kb/HT3216", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://support.apple.com/kb/HT3216" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm" }, { "reference_url": "http://svn.apache.org/viewvc?view=rev&revision=606594", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://svn.apache.org/viewvc?view=rev&revision=606594" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html" }, { "reference_url": "http://tomcat.apache.org/security-5.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://tomcat.apache.org/security-5.html" }, { "reference_url": "http://tomcat.apache.org/security-6.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://tomcat.apache.org/security-6.html" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1447", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.debian.org/security/2008/dsa-1447" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0042.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0195.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0831.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0832.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0833.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0834.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/archive/1/485481/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/27006", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/27006" }, { "reference_url": "http://www.securityfocus.com/bid/31681", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/31681" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216", "reference_id": "427216", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342", "reference_id": "CVE-2007-5342", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "apache_tomcat", "scoring_elements": "" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342", "reference_id": "CVE-2007-5342", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5342" }, { "reference_url": "https://github.com/advisories/GHSA-w65j-cmqc-37p2", "reference_id": "GHSA-w65j-cmqc-37p2", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-w65j-cmqc-37p2" }, { "reference_url": "https://security.gentoo.org/glsa/200804-10", "reference_id": "GLSA-200804-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200804-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0042", "reference_id": "RHSA-2008:0042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0195", "reference_id": "RHSA-2008:0195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0831", "reference_id": "RHSA-2008:0831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0831" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0832", "reference_id": "RHSA-2008:0832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0833", "reference_id": "RHSA-2008:0833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0834", "reference_id": "RHSA-2008:0834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0834" } ], "weaknesses": [ { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 264, "name": "Permissions, Privileges, and Access Controls", "description": "Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 284, "name": "Improper Access Control", "description": "The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor." } ], "exploits": [], "severity_range_score": "0.1 - 6.9", "exploitability": "0.5", "weighted_severity": "6.2", "risk_score": 3.1, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hhkg-mfp5-2kax" }