Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-8w1a-ww52-x7em
SummaryThe doRead method in Apache Tomcat 4.1.32 through 4.1.34 and 5.5.10 through 5.5.20 does not return a -1 to indicate when a certain error condition has occurred, which can cause Tomcat to send POST content from one request to a different request.
Aliases
0
alias CVE-2008-4308
1
alias GHSA-7g59-hm8v-cwmc
Fixed_packages
0
url pkg:apache/tomcat@4.1.35
purl pkg:apache/tomcat@4.1.35
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@4.1.35
1
url pkg:apache/tomcat@5.5.21
purl pkg:apache/tomcat@5.5.21
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-87p8-zvvf-y7dm
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@5.5.21
Affected_packages
0
url pkg:apache/tomcat@4.1.32
purl pkg:apache/tomcat@4.1.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8w1a-ww52-x7em
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@4.1.32
1
url pkg:apache/tomcat@4.1.34
purl pkg:apache/tomcat@4.1.34
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6epr-2hbd-skcz
1
vulnerability VCID-87p8-zvvf-y7dm
2
vulnerability VCID-8w1a-ww52-x7em
3
vulnerability VCID-qxkf-4ddv-j3b7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@4.1.34
2
url pkg:apache/tomcat@5.5.10
purl pkg:apache/tomcat@5.5.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8w1a-ww52-x7em
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@5.5.10
3
url pkg:apache/tomcat@5.5.20
purl pkg:apache/tomcat@5.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8w1a-ww52-x7em
1
vulnerability VCID-qdck-q54n-rkcv
2
vulnerability VCID-qxkf-4ddv-j3b7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@5.5.20
4
url pkg:maven/org.apache.tomcat/tomcat@4.1.32
purl pkg:maven/org.apache.tomcat/tomcat@4.1.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8w1a-ww52-x7em
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@4.1.32
5
url pkg:maven/org.apache.tomcat/tomcat@4.1.34
purl pkg:maven/org.apache.tomcat/tomcat@4.1.34
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6epr-2hbd-skcz
1
vulnerability VCID-87p8-zvvf-y7dm
2
vulnerability VCID-8w1a-ww52-x7em
3
vulnerability VCID-qxkf-4ddv-j3b7
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@4.1.34
6
url pkg:maven/org.apache.tomcat/tomcat@5.5.10
purl pkg:maven/org.apache.tomcat/tomcat@5.5.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8w1a-ww52-x7em
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@5.5.10
7
url pkg:maven/org.apache.tomcat/tomcat@5.5.20
purl pkg:maven/org.apache.tomcat/tomcat@5.5.20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8w1a-ww52-x7em
1
vulnerability VCID-qdck-q54n-rkcv
2
vulnerability VCID-qxkf-4ddv-j3b7
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@5.5.20
References
0
reference_url http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000010.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000010.html
1
reference_url http://jvn.jp/en/jp/JVN66905322/index.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://jvn.jp/en/jp/JVN66905322/index.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4308.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4308.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4308
reference_id
reference_type
scores
0
value 0.07599
scoring_system epss
scoring_elements 0.91871
published_at 2026-04-16T12:55:00Z
1
value 0.07599
scoring_system epss
scoring_elements 0.9181
published_at 2026-04-01T12:55:00Z
2
value 0.07599
scoring_system epss
scoring_elements 0.91819
published_at 2026-04-02T12:55:00Z
3
value 0.07599
scoring_system epss
scoring_elements 0.91825
published_at 2026-04-04T12:55:00Z
4
value 0.07599
scoring_system epss
scoring_elements 0.91833
published_at 2026-04-07T12:55:00Z
5
value 0.07599
scoring_system epss
scoring_elements 0.91845
published_at 2026-04-08T12:55:00Z
6
value 0.07599
scoring_system epss
scoring_elements 0.91851
published_at 2026-04-09T12:55:00Z
7
value 0.07599
scoring_system epss
scoring_elements 0.91855
published_at 2026-04-11T12:55:00Z
8
value 0.07599
scoring_system epss
scoring_elements 0.91856
published_at 2026-04-12T12:55:00Z
9
value 0.07599
scoring_system epss
scoring_elements 0.91852
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4308
4
reference_url http://secunia.com/advisories/34057
reference_id
reference_type
scores
url http://secunia.com/advisories/34057
5
reference_url https://github.com/apache/tomcat
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat
6
reference_url https://issues.apache.org/bugzilla/show_bug.cgi?id=40771
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/bugzilla/show_bug.cgi?id=40771
7
reference_url https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
13
reference_url https://web.archive.org/web/20090228052951/http://secunia.com/advisories/34057
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20090228052951/http://secunia.com/advisories/34057
14
reference_url https://web.archive.org/web/20111229174634/http://www.securityfocus.com/archive/1/501250
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20111229174634/http://www.securityfocus.com/archive/1/501250
15
reference_url https://web.archive.org/web/20201207165808/http://www.securityfocus.com/bid/33913
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201207165808/http://www.securityfocus.com/bid/33913
16
reference_url http://www.securityfocus.com/archive/1/501250
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501250
17
reference_url http://www.securityfocus.com/bid/33913
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33913
18
reference_url http://www.vupen.com/english/advisories/2009/0541
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0541
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=488040
reference_id 488040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=488040
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4308
reference_id CVE-2008-4308
reference_type
scores
0
value Low
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4308
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4308
reference_id CVE-2008-4308
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2008-4308
36
reference_url https://github.com/advisories/GHSA-7g59-hm8v-cwmc
reference_id GHSA-7g59-hm8v-cwmc
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7g59-hm8v-cwmc
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score0.1 - 3
Exploitability0.5
Weighted_severity2.7
Risk_score1.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-8w1a-ww52-x7em