{"url":"http://public2.vulnerablecode.io/api/packages/1411?format=json","purl":"pkg:maven/org.apache.tomcat/tomcat@6.0.20","type":"maven","namespace":"org.apache.tomcat","name":"tomcat","version":"6.0.20","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4716?format=json","vulnerability_id":"VCID-1qt3-ctae-sfgw","summary":"Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02241113"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=127420533226623&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=127420533226623&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=133469267822771&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=133469267822771&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=136485229118404&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=136485229118404&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139344343412337&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=139344343412337&w=2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0119","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0580","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0582","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0582"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2693.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2693","reference_id":"","reference_type":"","scores":[{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.9469","published_at":"2026-05-12T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94605","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94632","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94635","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94643","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94651","published_at":"2026-04-21T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94661","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94669","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94678","published_at":"2026-05-09T12:55:00Z"},{"value":"0.15322","scoring_system":"epss","scoring_elements":"0.94685","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2693"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/55855","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/55855"},{"reference_url":"https://github.com/apache/tomcat","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat"},{"reference_url":"https://github.com/apache/tomcat55/commit/0299cb724ea71f304d54adfcdb950f59b01fb421","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat55/commit/0299cb724ea71f304d54adfcdb950f59b01fb421"},{"reference_url":"https://github.com/apache/tomcat/commit/3e1010b1a2f648581fac3d68afbf18f2979f6bf6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/3e1010b1a2f648581fac3d68afbf18f2979f6bf6"},{"reference_url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19355","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19355"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7017","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7017"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:19355","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:19355"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7017","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7017"},{"reference_url":"https://support.hpe.com/hpesc/public/docDisplay?docId=c02241113","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=c02241113"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=892815","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=892815"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=902650","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=902650"},{"reference_url":"http://support.apple.com/kb/HT4077","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT4077"},{"reference_url":"http://svn.apache.org/viewvc?rev=892815&view=rev","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc?rev=892815&view=rev"},{"reference_url":"http://svn.apache.org/viewvc?rev=902650&view=rev","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc?rev=902650&view=rev"},{"reference_url":"https://web.archive.org/web/20200229071135/http://www.securityfocus.com/bid/37944","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200229071135/http://www.securityfocus.com/bid/37944"},{"reference_url":"https://web.archive.org/web/20200516121700/http://www.securityfocus.com/archive/1/516397/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200516121700/http://www.securityfocus.com/archive/1/516397/100/0/threaded"},{"reference_url":"https://web.archive.org/web/20201206235536/http://www.securityfocus.com/archive/1/509148/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20201206235536/http://www.securityfocus.com/archive/1/509148/100/0/threaded"},{"reference_url":"http://tomcat.apache.org/security-5.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-5.html"},{"reference_url":"http://tomcat.apache.org/security-6.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-6.html"},{"reference_url":"http://ubuntu.com/usn/usn-899-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://ubuntu.com/usn/usn-899-1"},{"reference_url":"http://www.debian.org/security/2011/dsa-2207","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2011/dsa-2207"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:177","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0119.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0119.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0580.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0580.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0582.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0582.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html"},{"reference_url":"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=559738","reference_id":"559738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=559738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693","reference_id":"CVE-2009-2693","reference_type":"","scores":[{"value":"Low","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2693","reference_id":"CVE-2009-2693","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2693"},{"reference_url":"https://github.com/advisories/GHSA-ggx9-4728-588r","reference_id":"GHSA-ggx9-4728-588r","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-ggx9-4728-588r"},{"reference_url":"https://security.gentoo.org/glsa/201206-24","reference_id":"GLSA-201206-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0693","reference_id":"RHSA-2010:0693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0693"},{"reference_url":"https://usn.ubuntu.com/899-1/","reference_id":"USN-899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/899-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1412?format=json","purl":"pkg:maven/org.apache.tomcat/tomcat@6.0.24","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.24"}],"aliases":["CVE-2009-2693","GHSA-ggx9-4728-588r"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1qt3-ctae-sfgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4729?format=json","vulnerability_id":"VCID-g998-xymt-fudu","summary":"The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=127420533226623&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=127420533226623&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=133469267822771&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=133469267822771&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139344343412337&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=139344343412337&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2901.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2901.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2901","reference_id":"","reference_type":"","scores":[{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91138","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91088","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91094","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91111","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91137","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91162","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91166","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06552","scoring_system":"epss","scoring_elements":"0.91173","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07107","scoring_system":"epss","scoring_elements":"0.91591","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07107","scoring_system":"epss","scoring_elements":"0.91601","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07107","scoring_system":"epss","scoring_elements":"0.9157","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07107","scoring_system":"epss","scoring_elements":"0.91583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07107","scoring_system":"epss","scoring_elements":"0.91593","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2901"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/55856","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/55856"},{"reference_url":"https://github.com/apache/tomcat","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat"},{"reference_url":"https://github.com/apache/tomcat55/commit/0299cb724ea71f304d54adfcdb950f59b01fb421","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat55/commit/0299cb724ea71f304d54adfcdb950f59b01fb421"},{"reference_url":"https://github.com/apache/tomcat/commit/3e1010b1a2f648581fac3d68afbf18f2979f6bf6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/3e1010b1a2f648581fac3d68afbf18f2979f6bf6"},{"reference_url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=892815","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=892815"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=902650","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=902650"},{"reference_url":"http://support.apple.com/kb/HT4077","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT4077"},{"reference_url":"http://svn.apache.org/viewvc?rev=892815&view=rev","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc?rev=892815&view=rev"},{"reference_url":"http://svn.apache.org/viewvc?rev=902650&view=rev","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc?rev=902650&view=rev"},{"reference_url":"http://tomcat.apache.org/security-5.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-5.html"},{"reference_url":"http://tomcat.apache.org/security-6.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-6.html"},{"reference_url":"http://ubuntu.com/usn/usn-899-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://ubuntu.com/usn/usn-899-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=559742","reference_id":"559742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=559742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901","reference_id":"CVE-2009-2901","reference_type":"","scores":[{"value":"Low","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2901","reference_id":"CVE-2009-2901","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2901"},{"reference_url":"https://github.com/advisories/GHSA-hjfh-7c4v-7q8h","reference_id":"GHSA-hjfh-7c4v-7q8h","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-hjfh-7c4v-7q8h"},{"reference_url":"https://security.gentoo.org/glsa/201206-24","reference_id":"GLSA-201206-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-24"},{"reference_url":"https://usn.ubuntu.com/899-1/","reference_id":"USN-899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/899-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1412?format=json","purl":"pkg:maven/org.apache.tomcat/tomcat@6.0.24","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.24"}],"aliases":["CVE-2009-2901","GHSA-hjfh-7c4v-7q8h"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g998-xymt-fudu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4733?format=json","vulnerability_id":"VCID-vm4b-26sq-tfev","summary":"The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3548","reference_id":"","reference_type":"","scores":[{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99439","published_at":"2026-05-12T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99425","published_at":"2026-04-01T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.9943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99435","published_at":"2026-04-29T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99436","published_at":"2026-05-05T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99437","published_at":"2026-05-07T12:55:00Z"},{"value":"0.86884","scoring_system":"epss","scoring_elements":"0.99438","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3548"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=881771","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=881771"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=919006","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=919006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548","reference_id":"CVE-2009-3548","reference_type":"","scores":[{"value":"Low","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/31433.rb","reference_id":"CVE-2009-3548;OSVDB-60176","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/31433.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16317.rb","reference_id":"CVE-2010-4094;CVE-2010-0557;CVE-2009-4189;CVE-2009-4188;CVE-2009-3843;CVE-2009-3548;OSVDB-60670;OSVDB-60317;OSVDB-60176","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16317.rb"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-10-214/","reference_id":"CVE-2010-4094;CVE-2010-0557;CVE-2009-4189;CVE-2009-4188;CVE-2009-3843;CVE-2009-3548;OSVDB-60670;OSVDB-60317;OSVDB-60176","reference_type":"exploit","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-10-214/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1412?format=json","purl":"pkg:maven/org.apache.tomcat/tomcat@6.0.24","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.24"}],"aliases":["CVE-2009-3548"],"risk_score":5.4,"exploitability":"2.0","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vm4b-26sq-tfev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4731?format=json","vulnerability_id":"VCID-wsn2-pd9b-b3g8","summary":"Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=127420533226623&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=127420533226623&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=133469267822771&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=133469267822771&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=136485229118404&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=136485229118404&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139344343412337&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=139344343412337&w=2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0119","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0580","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0582","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0582"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2902.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2902.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2902","reference_id":"","reference_type":"","scores":[{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93152","published_at":"2026-05-12T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93054","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93067","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93066","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93074","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93079","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93083","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93104","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93109","published_at":"2026-04-21T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.9311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93117","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93132","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93142","published_at":"2026-05-09T12:55:00Z"},{"value":"0.1008","scoring_system":"epss","scoring_elements":"0.93145","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2902"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/55857","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/55857"},{"reference_url":"https://github.com/apache/tomcat","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat"},{"reference_url":"https://github.com/apache/tomcat55/commit/0299cb724ea71f304d54adfcdb950f59b01fb421","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat55/commit/0299cb724ea71f304d54adfcdb950f59b01fb421"},{"reference_url":"https://github.com/apache/tomcat/commit/3e1010b1a2f648581fac3d68afbf18f2979f6bf6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/3e1010b1a2f648581fac3d68afbf18f2979f6bf6"},{"reference_url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19431"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:19431","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:19431"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7092","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7092"},{"reference_url":"https://support.apple.com/kb/HT4077","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.apple.com/kb/HT4077"},{"reference_url":"https://support.hpe.com/hpesc/public/docDisplay?docId=c02241113","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=c02241113"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=892815","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=892815"},{"reference_url":"https://svn.apache.org/viewvc?view=rev&rev=902650","reference_id":"","reference_type":"","scores":[],"url":"https://svn.apache.org/viewvc?view=rev&rev=902650"},{"reference_url":"http://support.apple.com/kb/HT4077","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4077"},{"reference_url":"http://svn.apache.org/viewvc?rev=892815&view=rev","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc?rev=892815&view=rev"},{"reference_url":"http://svn.apache.org/viewvc?rev=902650&view=rev","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc?rev=902650&view=rev"},{"reference_url":"https://web.archive.org/web/20100127015355/http://secunia.com/advisories/38346","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20100127015355/http://secunia.com/advisories/38346"},{"reference_url":"https://web.archive.org/web/20100127190258/http://secunia.com/advisories/38316","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20100127190258/http://secunia.com/advisories/38316"},{"reference_url":"https://web.archive.org/web/20100329100145/http://secunia.com/advisories/38687","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20100329100145/http://secunia.com/advisories/38687"},{"reference_url":"https://web.archive.org/web/20100412065745/http://secunia.com/advisories/39317","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20100412065745/http://secunia.com/advisories/39317"},{"reference_url":"https://web.archive.org/web/20100601000000*/http://secunia.com/advisories/40813","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20100601000000*/http://secunia.com/advisories/40813"},{"reference_url":"https://web.archive.org/web/20110213053623/https://secunia.com/advisories/43310","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20110213053623/https://secunia.com/advisories/43310"},{"reference_url":"https://web.archive.org/web/20110529135656/http://secunia.com/advisories/38541","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20110529135656/http://secunia.com/advisories/38541"},{"reference_url":"https://web.archive.org/web/20110601000000*/http://secunia.com/advisories/40330","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20110601000000*/http://secunia.com/advisories/40330"},{"reference_url":"https://web.archive.org/web/20111119150528/http://www.securityfocus.com/archive/1/516397/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20111119150528/http://www.securityfocus.com/archive/1/516397/100/0/threaded"},{"reference_url":"https://web.archive.org/web/20121211115829/http://securitytracker.com/id?1023504","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20121211115829/http://securitytracker.com/id?1023504"},{"reference_url":"https://web.archive.org/web/20121211195847/http://www.securityfocus.com/bid/37945","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20121211195847/http://www.securityfocus.com/bid/37945"},{"reference_url":"https://web.archive.org/web/20140515000000*/http://secunia.com/advisories/57126","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20140515000000*/http://secunia.com/advisories/57126"},{"reference_url":"https://web.archive.org/web/20150308000602/http://www.securityfocus.com/archive/1/509150/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20150308000602/http://www.securityfocus.com/archive/1/509150/100/0/threaded"},{"reference_url":"http://tomcat.apache.org/security-5.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-5.html"},{"reference_url":"http://tomcat.apache.org/security-6.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/security-6.html"},{"reference_url":"http://ubuntu.com/usn/usn-899-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://ubuntu.com/usn/usn-899-1"},{"reference_url":"http://www.debian.org/security/2011/dsa-2207","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2011/dsa-2207"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:176"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:177","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:177"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html"},{"reference_url":"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=559761","reference_id":"559761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=559761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902","reference_id":"CVE-2009-2902","reference_type":"","scores":[{"value":"Low","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2902","reference_id":"CVE-2009-2902","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2902"},{"reference_url":"https://github.com/advisories/GHSA-8wch-9gcg-v2pr","reference_id":"GHSA-8wch-9gcg-v2pr","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-8wch-9gcg-v2pr"},{"reference_url":"https://security.gentoo.org/glsa/201206-24","reference_id":"GLSA-201206-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0693","reference_id":"RHSA-2010:0693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0693"},{"reference_url":"https://usn.ubuntu.com/899-1/","reference_id":"USN-899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/899-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1412?format=json","purl":"pkg:maven/org.apache.tomcat/tomcat@6.0.24","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.24"}],"aliases":["CVE-2009-2902","GHSA-8wch-9gcg-v2pr"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wsn2-pd9b-b3g8"}],"fixing_vulnerabilities":[],"risk_score":"5.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.20"}