{"url":"http://public2.vulnerablecode.io/api/packages/129526?format=json","purl":"pkg:rpm/redhat/mod_perl@2.0.2-12?arch=el4","type":"rpm","namespace":"redhat","name":"mod_perl","version":"2.0.2-12","qualifiers":{"arch":"el4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4781?format=json","vulnerability_id":"VCID-27q8-96un-9fbk","summary":"Multiple cross-site scripting (XSS) vulnerabilities in the appdev/sample/web/hello.jsp example application in Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.23, and 6.0.0 through 6.0.10 allow remote attackers to inject arbitrary web script or HTML via the test parameter and unspecified vectors.","references":[{"reference_url":"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"},{"reference_url":"http://osvdb.org/34875","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/34875"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1355.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1355.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1355","reference_id":"","reference_type":"","scores":[{"value":"0.833","scoring_system":"epss","scoring_elements":"0.99271","published_at":"2026-04-13T12:55:00Z"},{"value":"0.833","scoring_system":"epss","scoring_elements":"0.9927","published_at":"2026-04-08T12:55:00Z"},{"value":"0.833","scoring_system":"epss","scoring_elements":"0.99269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.833","scoring_system":"epss","scoring_elements":"0.99266","published_at":"2026-04-04T12:55:00Z"},{"value":"0.833","scoring_system":"epss","scoring_elements":"0.99263","published_at":"2026-04-02T12:55:00Z"},{"value":"0.833","scoring_system":"epss","scoring_elements":"0.99272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.833","scoring_system":"epss","scoring_elements":"0.99262","published_at":"2026-04-01T12:55:00Z"},{"value":"0.84291","scoring_system":"epss","scoring_elements":"0.9933","published_at":"2026-05-12T12:55:00Z"},{"value":"0.84291","scoring_system":"epss","scoring_elements":"0.99326","published_at":"2026-05-07T12:55:00Z"},{"value":"0.84291","scoring_system":"epss","scoring_elements":"0.99324","published_at":"2026-05-05T12:55:00Z"},{"value":"0.84291","scoring_system":"epss","scoring_elements":"0.99323","published_at":"2026-04-29T12:55:00Z"},{"value":"0.84291","scoring_system":"epss","scoring_elements":"0.99328","published_at":"2026-05-11T12:55:00Z"},{"value":"0.84291","scoring_system":"epss","scoring_elements":"0.99327","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1355"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27727","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27727"},{"reference_url":"http://secunia.com/advisories/30802","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30802"},{"reference_url":"http://secunia.com/advisories/30899","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30899"},{"reference_url":"http://secunia.com/advisories/30908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30908"},{"reference_url":"http://secunia.com/advisories/31493","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31493"},{"reference_url":"http://secunia.com/advisories/33668","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33668"},{"reference_url":"http://securityreason.com/securityalert/2722","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/2722"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34377","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34377"},{"reference_url":"https://github.com/apache/tomcat","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat"},{"reference_url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6111","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6111"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1"},{"reference_url":"http://support.apple.com/kb/HT2163","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT2163"},{"reference_url":"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"},{"reference_url":"http://tomcat.apache.org/security-4.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-4.html"},{"reference_url":"http://tomcat.apache.org/security-5.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-5.html"},{"reference_url":"http://tomcat.apache.org/security-6.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-6.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"reference_url":"http://www.securityfocus.com/archive/1/469067/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/469067/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/500396/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/500396/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/500412/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/500412/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24058","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24058"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1979/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1979/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1981/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1981/references"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0233","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=253166","reference_id":"253166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=253166"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355","reference_id":"CVE-2007-1355","reference_type":"","scores":[{"value":"Moderate","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1355","reference_id":"CVE-2007-1355","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1355"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/30052.txt","reference_id":"CVE-2007-1355;OSVDB-34875","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/30052.txt"},{"reference_url":"https://www.securityfocus.com/bid/24058/info","reference_id":"CVE-2007-1355;OSVDB-34875","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/24058/info"},{"reference_url":"https://github.com/advisories/GHSA-4c6x-gfc8-c26r","reference_id":"GHSA-4c6x-gfc8-c26r","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-4c6x-gfc8-c26r"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2007-1355","GHSA-4c6x-gfc8-c26r"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-27q8-96un-9fbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/14160?format=json","vulnerability_id":"VCID-6d1j-1n1r-7khr","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nMultiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.","references":[{"reference_url":"http://issues.apache.org/jira/browse/GERONIMO-1474","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://issues.apache.org/jira/browse/GERONIMO-1474"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0254.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0254","reference_id":"","reference_type":"","scores":[{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97635","published_at":"2026-05-12T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97587","published_at":"2026-04-02T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.9759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97596","published_at":"2026-04-08T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97602","published_at":"2026-04-11T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-05-11T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97627","published_at":"2026-05-07T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97614","published_at":"2026-04-26T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97613","published_at":"2026-04-24T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97612","published_at":"2026-04-16T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.45321","scoring_system":"epss","scoring_elements":"0.97581","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0254"},{"reference_url":"http://secunia.com/advisories/18485","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/18485"},{"reference_url":"http://secunia.com/advisories/31493","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/31493"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24158","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24158"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24159","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24159"},{"reference_url":"https://geronimo.apache.org/GMOxDOC11/release-notes-11txt.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://geronimo.apache.org/GMOxDOC11/release-notes-11txt.html"},{"reference_url":"https://issues.apache.org/jira/secure/attachment/12322088/GERONIMO-1474.patch","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/secure/attachment/12322088/GERONIMO-1474.patch"},{"reference_url":"https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12310181&styleName=Html&projectId=10220&Create=Create"},{"reference_url":"http://svn.apache.org/viewvc/geronimo","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc/geronimo"},{"reference_url":"http://svn.apache.org/viewvc?view=revision&revision=372322","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc?view=revision&revision=372322"},{"reference_url":"http://www.oliverkarow.de/research/geronimo_css.txt","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oliverkarow.de/research/geronimo_css.txt"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"reference_url":"http://www.securityfocus.com/archive/1/421996/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/archive/1/421996/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/16260","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/16260"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0217","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vupen.com/english/advisories/2006/0217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=430646","reference_id":"430646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=430646"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0254","reference_id":"CVE-2006-0254","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0254"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/27095.txt","reference_id":"CVE-2006-0254;OSVDB-22458","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/27095.txt"},{"reference_url":"https://www.securityfocus.com/bid/16260/info","reference_id":"CVE-2006-0254;OSVDB-22458","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/16260/info"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/27096.txt","reference_id":"CVE-2006-0254;OSVDB-22459","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/27096.txt"},{"reference_url":"https://github.com/advisories/GHSA-2jxh-3cx8-xw65","reference_id":"GHSA-2jxh-3cx8-xw65","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2jxh-3cx8-xw65"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0161","reference_id":"RHSA-2006:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0592","reference_id":"RHSA-2006:0592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2006-0254","GHSA-2jxh-3cx8-xw65"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6d1j-1n1r-7khr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4763?format=json","vulnerability_id":"VCID-88v7-kc2y-bfd7","summary":"Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.","references":[{"reference_url":"http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html"},{"reference_url":"http://issues.apache.org/jira/browse/GERONIMO-3549","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://issues.apache.org/jira/browse/GERONIMO-3549"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"},{"reference_url":"http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705@apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705@apache.org%3E"},{"reference_url":"http://marc.info/?l=bugtraq&m=139344343412337&w=2","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=139344343412337&w=2"},{"reference_url":"http://marc.info/?l=full-disclosure&m=119239530508382","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=full-disclosure&m=119239530508382"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5461.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5461.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5461","reference_id":"","reference_type":"","scores":[{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.91009","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.91","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.91002","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90988","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90972","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90955","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90957","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.9096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90947","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90916","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.9091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90948","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5461"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200804-10.xml","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://security.gentoo.org/glsa/glsa-200804-10.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37243","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/37243"},{"reference_url":"https://github.com/apache/tomcat","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat"},{"reference_url":"https://github.com/apache/tomcat/commit/1e7b31e24801777f4de45d565f6a20a5377dd22c","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/1e7b31e24801777f4de45d565f6a20a5377dd22c"},{"reference_url":"https://github.com/apache/tomcat/commit/901292cf9d7d8225f8a3b96c7583e2bd8b41772d","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/901292cf9d7d8225f8a3b96c7583e2bd8b41772d"},{"reference_url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"http://support.apple.com/kb/HT2163","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT2163"},{"reference_url":"http://support.apple.com/kb/HT3216","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT3216"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"},{"reference_url":"http://tomcat.apache.org/security-4.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-4.html"},{"reference_url":"http://tomcat.apache.org/security-5.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-5.html"},{"reference_url":"http://tomcat.apache.org/security-6.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-6.html"},{"reference_url":"http://www.debian.org/security/2008/dsa-1447","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2008/dsa-1447"},{"reference_url":"http://www.debian.org/security/2008/dsa-1453","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2008/dsa-1453"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0042.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2008-0042.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0195.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2008-0195.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0862.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2008-0862.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=333791","reference_id":"333791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=333791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461","reference_id":"CVE-2007-5461","reference_type":"","scores":[{"value":"Important","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/4552.pl","reference_id":"CVE-2007-5461","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/4552.pl"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-5461","reference_id":"CVE-2007-5461","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-5461"},{"reference_url":"https://github.com/advisories/GHSA-v5p2-vg3c-pmrr","reference_id":"GHSA-v5p2-vg3c-pmrr","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-v5p2-vg3c-pmrr"},{"reference_url":"https://security.gentoo.org/glsa/200804-10","reference_id":"GLSA-200804-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-10"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/4530.pl","reference_id":"OSVDB-38187;CVE-2007-5461","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/4530.pl"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0042","reference_id":"RHSA-2008:0042","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0151","reference_id":"RHSA-2008:0151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0158","reference_id":"RHSA-2008:0158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0195","reference_id":"RHSA-2008:0195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0213","reference_id":"RHSA-2008:0213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2007-5461","GHSA-v5p2-vg3c-pmrr"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88v7-kc2y-bfd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51103?format=json","vulnerability_id":"VCID-9zzc-scyf-ckdb","summary":"The mod_perl Apache module is vulnerable to a Denial of Service when\n    processing regular expressions.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0395.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0395.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1349.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1349.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1349","reference_id":"","reference_type":"","scores":[{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.951","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95106","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95108","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.9511","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95118","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95124","published_at":"2026-04-21T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95087","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17687","scoring_system":"epss","scoring_elements":"0.95089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18225","scoring_system":"epss","scoring_elements":"0.95227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.18225","scoring_system":"epss","scoring_elements":"0.95234","published_at":"2026-05-07T12:55:00Z"},{"value":"0.18225","scoring_system":"epss","scoring_elements":"0.95242","published_at":"2026-05-09T12:55:00Z"},{"value":"0.18225","scoring_system":"epss","scoring_elements":"0.95247","published_at":"2026-05-11T12:55:00Z"},{"value":"0.18225","scoring_system":"epss","scoring_elements":"0.95253","published_at":"2026-05-12T12:55:00Z"},{"value":"0.18225","scoring_system":"epss","scoring_elements":"0.95212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.18225","scoring_system":"epss","scoring_elements":"0.95214","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1349"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349"},{"reference_url":"http://secunia.com/advisories/24678","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24678"},{"reference_url":"http://secunia.com/advisories/24839","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24839"},{"reference_url":"http://secunia.com/advisories/25072","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25072"},{"reference_url":"http://secunia.com/advisories/25110","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25110"},{"reference_url":"http://secunia.com/advisories/25432","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25432"},{"reference_url":"http://secunia.com/advisories/25655","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25655"},{"reference_url":"http://secunia.com/advisories/25730","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25730"},{"reference_url":"http://secunia.com/advisories/25894","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25894"},{"reference_url":"http://secunia.com/advisories/26084","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26084"},{"reference_url":"http://secunia.com/advisories/26231","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26231"},{"reference_url":"http://secunia.com/advisories/26290","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26290"},{"reference_url":"http://secunia.com/advisories/31490","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31490"},{"reference_url":"http://secunia.com/advisories/31493","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31493"},{"reference_url":"http://secunia.com/advisories/33720","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33720"},{"reference_url":"http://secunia.com/advisories/33723","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33723"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-04.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33312","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33312"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-293.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-293.htm"},{"reference_url":"http://svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes","reference_id":"","reference_type":"","scores":[],"url":"http://svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes"},{"reference_url":"http://www.gossamer-threads.com/lists/modperl/modperl/92739","reference_id":"","reference_type":"","scores":[],"url":"http://www.gossamer-threads.com/lists/modperl/modperl/92739"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:083","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:083"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_12_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_12_sr.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_8_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_8_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0396.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0396.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0486.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0486.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0627.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0627.html"},{"reference_url":"http://www.securityfocus.com/bid/23192","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23192"},{"reference_url":"http://www.securitytracker.com/id?1018259","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018259"},{"reference_url":"http://www.trustix.org/errata/2007/0023/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0023/"},{"reference_url":"http://www.ubuntu.com/usn/usn-488-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-488-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1150","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1150"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=240423","reference_id":"240423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=240423"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=433549","reference_id":"433549","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=433549"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mod_perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:mod_perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mod_perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1349","reference_id":"CVE-2007-1349","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1349"},{"reference_url":"https://security.gentoo.org/glsa/200705-04","reference_id":"GLSA-200705-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0395","reference_id":"RHSA-2007:0395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0396","reference_id":"RHSA-2007:0396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0486","reference_id":"RHSA-2007:0486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0263","reference_id":"RHSA-2008:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0523","reference_id":"RHSA-2008:0523","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0523"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0627","reference_id":"RHSA-2008:0627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"},{"reference_url":"https://usn.ubuntu.com/488-1/","reference_id":"USN-488-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/488-1/"}],"fixed_packages":[],"aliases":["CVE-2007-1349"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9zzc-scyf-ckdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4770?format=json","vulnerability_id":"VCID-peya-mr7j-vugf","summary":"Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a \"snp/snoop.jsp;\" sequence.","references":[{"reference_url":"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx","reference_id":"","reference_type":"","scores":[],"url":"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"},{"reference_url":"http://osvdb.org/36080","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36080"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2449.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2449.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2449","reference_id":"","reference_type":"","scores":[{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97792","published_at":"2026-05-05T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.9779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97783","published_at":"2026-04-24T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97784","published_at":"2026-04-26T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97782","published_at":"2026-04-16T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97774","published_at":"2026-04-12T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97772","published_at":"2026-04-11T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.9777","published_at":"2026-04-09T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97752","published_at":"2026-04-01T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97801","published_at":"2026-05-12T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97796","published_at":"2026-05-11T12:55:00Z"},{"value":"0.4909","scoring_system":"epss","scoring_elements":"0.97793","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2449"},{"reference_url":"http://secunia.com/advisories/26076","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26076"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27727","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27727"},{"reference_url":"http://secunia.com/advisories/29392","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29392"},{"reference_url":"http://secunia.com/advisories/30802","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30802"},{"reference_url":"http://secunia.com/advisories/31493","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31493"},{"reference_url":"http://secunia.com/advisories/33668","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33668"},{"reference_url":"http://securityreason.com/securityalert/2804","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/2804"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34869","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34869"},{"reference_url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10578","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10578"},{"reference_url":"http://support.apple.com/kb/HT2163","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT2163"},{"reference_url":"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"},{"reference_url":"http://tomcat.apache.org/security-4.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-4.html"},{"reference_url":"http://tomcat.apache.org/security-5.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-5.html"},{"reference_url":"http://tomcat.apache.org/security-6.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-6.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:241","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:241"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0569.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2007-0569.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"reference_url":"http://www.securityfocus.com/archive/1/471351/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/471351/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/500396/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/500396/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/500412/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/500412/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24476","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24476"},{"reference_url":"http://www.securitytracker.com/id?1018245","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018245"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2213","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2213"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1981/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1981/references"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0233","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=244804","reference_id":"244804","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=244804"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449","reference_id":"CVE-2007-2449","reference_type":"","scores":[{"value":"Low","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2449","reference_id":"CVE-2007-2449","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2449"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/jsp/webapps/30189.txt","reference_id":"CVE-2007-2449;OSVDB-36080","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/jsp/webapps/30189.txt"},{"reference_url":"https://www.securityfocus.com/bid/24476/info","reference_id":"CVE-2007-2449;OSVDB-36080","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/24476/info"},{"reference_url":"https://github.com/advisories/GHSA-hc39-rjwp-qffq","reference_id":"GHSA-hc39-rjwp-qffq","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-hc39-rjwp-qffq"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0569","reference_id":"RHSA-2007:0569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0876","reference_id":"RHSA-2007:0876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2007-2449","GHSA-hc39-rjwp-qffq"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-peya-mr7j-vugf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4859?format=json","vulnerability_id":"VCID-q7jp-hn4a-4kec","summary":"Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp.  NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.","references":[{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065598.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065598.html"},{"reference_url":"http://marc.info/?l=tomcat-dev&m=110476790331536&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=tomcat-dev&m=110476790331536&w=2"},{"reference_url":"http://marc.info/?l=tomcat-dev&m=110477195116951&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=tomcat-dev&m=110477195116951&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4838.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4838.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4838","reference_id":"","reference_type":"","scores":[{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92196","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92111","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92185","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92188","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92118","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92147","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92152","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92155","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92153","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08075","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4838"},{"reference_url":"http://secunia.com/advisories/13737","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/13737"},{"reference_url":"http://secunia.com/advisories/31493","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31493"},{"reference_url":"http://securitytracker.com/id?1012793","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1012793"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36467","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36467"},{"reference_url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"http://tomcat.apache.org/security-4.html","reference_id":"","reference_type":"","scores":[],"url":"http://tomcat.apache.org/security-4.html"},{"reference_url":"http://tomcat.apache.org/security-5.html","reference_id":"","reference_type":"","scores":[],"url":"http://tomcat.apache.org/security-5.html"},{"reference_url":"http://www.oliverkarow.de/research/jakarta556_xss.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.oliverkarow.de/research/jakarta556_xss.txt"},{"reference_url":"http://www.osvdb.org/12721","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/12721"},{"reference_url":"http://www.osvdb.org/34878","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/34878"},{"reference_url":"http://www.osvdb.org/34879","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/34879"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=238401","reference_id":"238401","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=238401"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4838","reference_id":"CVE-2005-4838","reference_type":"","scores":[{"value":"Low","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4838"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4838","reference_id":"CVE-2005-4838","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2005-4838"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q7jp-hn4a-4kec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4788?format=json","vulnerability_id":"VCID-qdck-q54n-rkcv","summary":"The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0128.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0128.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0128","reference_id":"","reference_type":"","scores":[{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88302","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88203","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.8822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88213","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88226","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88224","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.8825","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88279","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88291","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03858","scoring_system":"epss","scoring_elements":"0.88289","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0128"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=684900","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=684900"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=429821","reference_id":"429821","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=429821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0128","reference_id":"CVE-2008-0128","reference_type":"","scores":[{"value":"Moderate","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2008-0128"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdck-q54n-rkcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4789?format=json","vulnerability_id":"VCID-qxkf-4ddv-j3b7","summary":"Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted \"Accept-Language headers that do not conform to RFC 2616\".","references":[{"reference_url":"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx","reference_id":"","reference_type":"","scores":[],"url":"http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=306172","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://docs.info.apple.com/article.html?artnum=306172"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"},{"reference_url":"http://jvn.jp/jp/JVN%2316535199/index.html","reference_id":"","reference_type":"","scores":[],"url":"http://jvn.jp/jp/JVN%2316535199/index.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"},{"reference_url":"http://osvdb.org/34881","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/34881"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1358.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1358.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1358","reference_id":"","reference_type":"","scores":[{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97362","published_at":"2026-05-12T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97324","published_at":"2026-04-13T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97336","published_at":"2026-04-24T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97339","published_at":"2026-04-29T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97343","published_at":"2026-05-05T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97348","published_at":"2026-05-07T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97352","published_at":"2026-05-09T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97358","published_at":"2026-05-11T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97301","published_at":"2026-04-01T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97313","published_at":"2026-04-07T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.9732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.39862","scoring_system":"epss","scoring_elements":"0.97323","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1358"},{"reference_url":"http://secunia.com/advisories/25721","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25721"},{"reference_url":"http://secunia.com/advisories/26235","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26235"},{"reference_url":"http://secunia.com/advisories/26660","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26660"},{"reference_url":"http://secunia.com/advisories/27037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27037"},{"reference_url":"http://secunia.com/advisories/27727","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27727"},{"reference_url":"http://secunia.com/advisories/30899","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30899"},{"reference_url":"http://secunia.com/advisories/30908","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30908"},{"reference_url":"http://secunia.com/advisories/31493","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31493"},{"reference_url":"http://secunia.com/advisories/33668","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33668"},{"reference_url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10679","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10679"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1"},{"reference_url":"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540","reference_id":"","reference_type":"","scores":[],"url":"http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html"},{"reference_url":"http://tomcat.apache.org/security-4.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-4.html"},{"reference_url":"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200704e.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.fujitsu.com/global/support/software/security/products-f/interstage-200704e.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"reference_url":"http://www.securityfocus.com/archive/1/471719/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/471719/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/500396/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/500396/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/500412/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/500412/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24524","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24524"},{"reference_url":"http://www.securityfocus.com/bid/25159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/25159"},{"reference_url":"http://www.securitytracker.com/id?1018269","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018269"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1729","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1729"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2732","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2732"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3087","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3087"},{"reference_url":"http://www.vupen.com/english/advisories/2007/3386","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/3386"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1979/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1979/references"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0233","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=244803","reference_id":"244803","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=244803"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358","reference_id":"CVE-2007-1358","reference_type":"","scores":[{"value":"Low","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1358","reference_id":"CVE-2007-1358","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1358"},{"reference_url":"https://github.com/advisories/GHSA-xmc9-6p56-3c4v","reference_id":"GHSA-xmc9-6p56-3c4v","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-xmc9-6p56-3c4v"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0360","reference_id":"RHSA-2007:0360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0876","reference_id":"RHSA-2007:0876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2007-1358","GHSA-xmc9-6p56-3c4v"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qxkf-4ddv-j3b7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36501?format=json","vulnerability_id":"VCID-ua4c-qyvs-7bfg","summary":"Crypt::CBC uses an insecure initialization vector, potentially resulting in\n    a weaker encryption.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0898.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0898","reference_id":"","reference_type":"","scores":[{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80685","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.8068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80709","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80735","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80721","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80713","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80749","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.8075","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80752","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80775","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80792","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80809","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80831","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80852","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80845","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80864","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0898"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=430522","reference_id":"430522","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=430522"},{"reference_url":"https://security.gentoo.org/glsa/200603-15","reference_id":"GLSA-200603-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200603-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2006-0898"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ua4c-qyvs-7bfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88566?format=json","vulnerability_id":"VCID-w7g5-angw-yfcp","summary":"JFreeChart: XSS vulnerabilities in the image map feature","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6306.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6306.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6306","reference_id":"","reference_type":"","scores":[{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84424","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84688","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84709","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84725","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84755","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84765","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84764","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.8478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84805","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84823","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84818","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84835","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6306"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=421081","reference_id":"421081","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=421081"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=456148","reference_id":"456148","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=456148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0151","reference_id":"RHSA-2008:0151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0158","reference_id":"RHSA-2008:0158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0213","reference_id":"RHSA-2008:0213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0630","reference_id":"RHSA-2008:0630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0630"}],"fixed_packages":[],"aliases":["CVE-2007-6306"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w7g5-angw-yfcp"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mod_perl@2.0.2-12%3Farch=el4"}