ID

VAR-E-200703-0001


CVE

cve_id:CVE-2008-2938

Trust: 3.9

cve_id:CVE-2007-0450

Trust: 0.8

cve_id:CVE-2007-2449

Trust: 0.8

cve_id:CVE-2007-1355

Trust: 0.5

cve_id:CVE-2007-3386

Trust: 0.5

cve_id:CVE-2006-3835

Trust: 0.5

cve_id:CVE-2007-3382

Trust: 0.3

cve_id:CVE-2007-3385

Trust: 0.3

cve_id:CVE-2007-4724

Trust: 0.3

cve_id:CVE-2006-7196

Trust: 0.3

sources: BID: 22960 // BID: 25316 // BID: 25531 // BID: 24476 // BID: 30633 // PACKETSTORM: 69010 // PACKETSTORM: 92240 // PACKETSTORM: 57183 // PACKETSTORM: 56883 // PACKETSTORM: 55163 // PACKETSTORM: 58554 // PACKETSTORM: 74165 // PACKETSTORM: 82649 // EXPLOIT-DB: 6229 // EDBNET: 30495

EDB ID

6229


TITLE

Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability

Trust: 1.2

sources: EDBNET: 70551 // EDBNET: 9239

DESCRIPTION

Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal (PoC). CVE-47464CVE-2008-2938 . remote exploit for Multiple platform

Trust: 1.0

sources: EXPLOIT-DB: 6229

AFFECTED PRODUCTS

vendor:s u s emodel:opensusescope:eqversion:10.2

Trust: 1.5

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0

Trust: 1.5

vendor:susemodel:linux enterprise server sp3scope:eqversion:9

Trust: 1.2

vendor:susemodel:linux enterprise server sp1scope:eqversion:10

Trust: 1.2

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.2

vendor:susemodel:linux enterprise sdkscope:eqversion:10

Trust: 1.2

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:10

Trust: 1.2

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 1.2

vendor:susemodel:linux professional x86 64scope:eqversion:10.2

Trust: 1.2

vendor:susemodel:linux personal x86 64scope:eqversion:10.2

Trust: 1.2

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 1.2

vendor:s u s emodel:suse linux standard serverscope:eqversion:8.0

Trust: 1.2

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 1.2

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 1.2

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 1.2

vendor:s u s emodel:linux professional ossscope:eqversion:10.0

Trust: 1.2

vendor:s u s emodel:linux professionalscope:eqversion:10.0

Trust: 1.2

vendor:s u s emodel:linux professionalscope:eqversion:10.2

Trust: 1.2

vendor:s u s emodel:linux professionalscope:eqversion:10.1

Trust: 1.2

vendor:s u s emodel:linux personalscope:eqversion:10.2

Trust: 1.2

vendor:s u s emodel:linux personalscope:eqversion:10.1

Trust: 1.2

vendor:s u s emodel:linuxscope:eqversion:10.1x86-64

Trust: 1.2

vendor:s u s emodel:linuxscope:eqversion:10.1x86

Trust: 1.2

vendor:s u s emodel:linux ppcscope:eqversion:10.1

Trust: 1.2

vendor:s u s emodel:linuxscope:eqversion:10.0x86-64

Trust: 1.2

vendor:s u s emodel:linuxscope:eqversion:10.0x86

Trust: 1.2

vendor:s u s emodel:linux ppcscope:eqversion:10.0

Trust: 1.2

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)4.2

Trust: 1.2

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 1.2

vendor:redmodel:hat red hat network satellite serverscope:eqversion:5.0

Trust: 1.2

vendor:redmodel:hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 1.2

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 1.2

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 1.2

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 1.2

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 1.2

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 1.2

vendor:computermodel:associates cohesion application configuration managerscope:eqversion:4.5

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.15

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.14

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.13

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.12

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.11

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.10

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.9

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.8

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.7

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.6

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.5

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.4

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.3

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.2

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.1

Trust: 1.2

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5

Trust: 1.2

vendor:computermodel:associates cohesion application configuration manager sp1scope:neversion:4.5

Trust: 1.2

vendor:apachemodel:tomcatscope:ltversion:6.0.18

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.9

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.9

vendor:susemodel:linux enterprise sdk 10.sp1scope: - version: -

Trust: 0.9

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.9

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.9

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.9

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.9

vendor:s u s emodel:linux personal ossscope:eqversion:10.0

Trust: 0.9

vendor:redmodel:hat red hat network satellite serverscope:eqversion:4.2

Trust: 0.9

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.9

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.9

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.1

Trust: 0.9

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.1

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.1

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.22

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.21

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.20

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.19

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.18

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.17

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.16

Trust: 0.9

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.9

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:10

Trust: 0.9

vendor:susemodel:opensusescope:eqversion:10.3

Trust: 0.9

vendor:s u s emodel:suse linux open-xchangescope:eqversion:4.1

Trust: 0.9

vendor:s u s emodel:opensusescope:eqversion:10.1

Trust: 0.9

vendor:s u s emodel:linux desktopscope:eqversion:10

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.30

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.16

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.15

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.14

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.13

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.12

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.11

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.10

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.3

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.2

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.1

Trust: 0.9

vendor:apachemodel:software foundation tomcatscope:eqversion:4.1

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 02scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 01scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 10scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 16scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 11scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 17scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 19scope:neversion: -

Trust: 0.9

vendor:susemodel:linux enterprise server sdkscope:eqversion:9

Trust: 0.6

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.6

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.6

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.6

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.6

vendor:redhatmodel:certificate serverscope:eqversion:7.3

Trust: 0.6

vendor:redmodel:hat red hat network satellite serverscope:eqversion:4.1

Trust: 0.6

vendor:redmodel:hat red hat network satellite serverscope:eqversion:4.0

Trust: 0.6

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.0

Trust: 0.6

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:8.0.1

Trust: 0.6

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.0

Trust: 0.6

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:8.0.1

Trust: 0.6

vendor:fujitsumodel:interstage job workload serverscope:eqversion:8.1

Trust: 0.6

vendor:fujitsumodel:interstage business application server enterprisescope:eqversion:8.0.0

Trust: 0.6

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:7.0

Trust: 0.6

vendor:fujitsumodel:interstage apworks modelers-j edition 6.0ascope: - version: -

Trust: 0.6

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:6.0

Trust: 0.6

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.0

Trust: 0.6

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.2

Trust: 0.6

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0

Trust: 0.6

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:6.0

Trust: 0.6

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0

Trust: 0.6

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.0

Trust: 0.6

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.2

Trust: 0.6

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0

Trust: 0.6

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0.1

Trust: 0.6

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0

Trust: 0.6

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.9

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.8

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.7

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.6

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.5

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.4

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.3

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.2

Trust: 0.6

vendor:susemodel:linux enterprise sp1 debuginfoscope:eqversion:10

Trust: 0.6

vendor:s u s emodel:open-enterprise-serverscope:eqversion:1

Trust: 0.6

vendor:s u s emodel:office serverscope: - version: -

Trust: 0.6

vendor:s u s emodel:novell linux desktop sdkscope:eqversion:9.0

Trust: 0.6

vendor:s u s emodel:novell linux desktopscope:eqversion:1.0

Trust: 0.6

vendor:s u s emodel:linux desktopscope:eqversion:1.0

Trust: 0.6

vendor:redmodel:hat fedorascope:eqversion:7

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.13

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.12

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.11

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0.10

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.24

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.5.23

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.28

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.19

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.9

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.8

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.7

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.6

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.5

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:5.0.4

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.1.36

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.1.24

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.1.12

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.1.10

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.0.6

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.0.5

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.0.4

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.0.3

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.0.2

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.0.1

Trust: 0.6

vendor:apachemodel:software foundation tomcatscope:eqversion:4.0

Trust: 0.6

vendor:novellmodel:zenworks linux managementscope:eqversion:7.3

Trust: 0.6

vendor:sunmodel:jre 1.6.0 2scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 07scope: - version: -

Trust: 0.6

vendor:apachemodel:tomcat utf8scope:ltversion:6.0.18

Trust: 0.6

vendor:apachemodel:tomcat utf-8scope: - version: -

Trust: 0.5

vendor:oraclemodel:containers for javascope: - version: -

Trust: 0.5

vendor:toutvirtualmodel:virtualiq proscope: - version: -

Trust: 0.5

vendor:vmwaremodel:virtualcenter management serverscope:eqversion:2

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.2

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.1

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux virtualization serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux optional productivity application serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux hardware certificationscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop multi os clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux clustering serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux cluster-storage serverscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.3

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:5.4

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:5.3

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:5.1

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:neversion:6.0.10

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:neversion:5.5.23

Trust: 0.3

vendor:s u s emodel:linux openexchange serverscope: - version: -

Trust: 0.3

vendor:s u s emodel:linux office serverscope: - version: -

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for novell groupwisescope:eqversion:5.0.1

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for novell groupwisescope:eqversion:4.1.7

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for novell groupwisescope:eqversion:4.1.4

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for exchange mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for exchangescope:eqversion:5.0.2

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for exchangescope:eqversion:5.0.1

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for exchange sp2scope:eqversion:5.0

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for exchangescope:eqversion:5.0

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for exchangescope:eqversion:4.1.7

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for exchangescope:eqversion:4.1.4

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for domino mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server for dominoscope:eqversion:4.1.4

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server express for exchange mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server express for exchangescope:eqversion:5.0.2

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server express for exchangescope:eqversion:5.0.1

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server express for exchangescope:eqversion:4.1.4

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server express for domino mr1scope:eqversion:5.0.2

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server express for dominoscope:eqversion:5.0.2

Trust: 0.3

vendor:researchmodel:in motion blackberry enterprise server express for dominoscope:eqversion:4.1.4

Trust: 0.3

vendor:redhatmodel:developer suite el4scope:eqversion:3

Trust: 0.3

vendor:ibmmodel:tivoli access manager enterprise single sign-onscope:eqversion:8.0.1

Trust: 0.3

vendor:hpmodel:tru64 unix 5.1b-4scope: - version: -

Trust: 0.3

vendor:hpmodel:tru64 unix pk6scope:eqversion:5.1.0

Trust: 0.3

vendor:hpmodel:tru64 unix b-4scope:eqversion:5.1.0

Trust: 0.3

vendor:hpmodel:tru64 unix b-3scope:eqversion:5.1.0

Trust: 0.3

vendor:hpmodel:internet expressscope:eqversion:6.7

Trust: 0.3

vendor:hpmodel:internet expressscope:eqversion:6.6

Trust: 0.3

vendor:hpmodel:internet expressscope:eqversion:6.5

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:6.0

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:4.1.34

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:3.3.2

Trust: 0.3

vendor:apachemodel:software foundation tomcat ascope:eqversion:3.3.1

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:3.3.1

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:3.3

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:neversion:6.0.14

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:eqversion:4.1.31

Trust: 0.3

vendor:apachemodel:software foundation tomcat betascope:eqversion:4.1.3

Trust: 0.3

vendor:apachemodel:software foundation tomcat rc2scope:eqversion:4.0.0

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:neversion:5.5.16

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:neversion:5.0.31

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:neversion:4.1.32

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:neversion:4.0.7

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)5.1

Trust: 0.3

vendor:apachemodel:software foundation tomcatscope:neversion:4.1.37

Trust: 0.3

vendor:wikidmodel:systems wikid serverscope:eqversion:3.0.4

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:10

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.5

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:sunmodel:jre 10-b03scope:eqversion:1.4.2

Trust: 0.3

vendor:sunmodel:jre 1.5.0 09scope: - version: -

Trust: 0.3

vendor:sunmodel:jre 1.5.0 08scope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:redhatmodel:red hat network satellite serverscope:eqversion:5.0.1

Trust: 0.3

vendor:redhatmodel:red hat network satellite serverscope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:red hat network satellite (for rhelscope:eqversion:4)5.1

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el5scope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el4scope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform .cp03scope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:developer suite as4scope:eqversion:3

Trust: 0.3

vendor:redhatmodel:application server ws4scope:eqversion:2

Trust: 0.3

vendor:redhatmodel:application server es4scope:eqversion:2

Trust: 0.3

vendor:redhatmodel:application server as4scope:eqversion:2

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.3.1.0

Trust: 0.3

vendor:openjdkmodel:javascope:eqversion:1.6

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.1

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition ascope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0.1

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition ascope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchange enterprise editionscope:eqversion: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0.0.52

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.6

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.5

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.4

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.3

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.16

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.15

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.14

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.13

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.12

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.11

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.10

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.9

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.8

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.7

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.6

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.4

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.26

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.25

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.24

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.23

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.22

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.21

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.20

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.19

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.18

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.17

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.16

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.15

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.14

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.13

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.12

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.11

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.10

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.9

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.8

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.7

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.6

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.4

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.37

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.36

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.34

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.32

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.31

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.30

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.29

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.28

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.24

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.12

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.10

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:4.1.9

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:4.1.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1

Trust: 0.3

vendor:apachemodel:harmony m8scope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:harmony m7scope:eqversion:5.0

Trust: 0.3

vendor:wikidmodel:systems wikid serverscope:neversion:3.0.5

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform .cp04scope:neversion:4.2

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:6.0.18

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:5.5.27

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:4.1.39

Trust: 0.3

sources: BID: 22960 // BID: 25316 // BID: 25531 // BID: 24476 // BID: 30633 // PACKETSTORM: 92240 // PACKETSTORM: 74165 // PACKETSTORM: 82649 // EXPLOIT-DB: 6229 // EDBNET: 30495

EXPLOIT

Title: Apache Tomcat Directory Traversal Vulnerability
Author: Simon Ryeo(bar4mi (at) gmail.com, barami (at) ahnlab.com)
Severity: High
Impact: Remote File Disclosure
Vulnerable Version: prior to 6.0.18
Solution:
- Best Choice: Upgrade to 6.0.18 (http://tomcat.apache.org)
- Hot fix: Disable allowLinking or do not set URIencoding to utf8 in order to avoid this vulnerability.
- Tomcat 5.5.x and 4.1.x Users: The fix will be included in the next releases. Please apply the hot fix until next release.
References:
- http://tomcat.apache.org/security.html
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938
History:
- 07.17.2008: Initiate notify (To Apache Security Team)
- 08.02.2008: Responsed this problem fixed and released new version
- 08.05.2008: Notify disclosure (To Apache Tomcat Security Team)
- 08.10.2008: Responsed with some suggestions.

Description
As Apache Security Team, this problem occurs because of JAVA side.
If your context.xml or server.xml allows 'allowLinking'and 'URIencoding' as
'UTF-8', an attacker can obtain your important system files.(e.g. /etc/passwd)

Exploit
If your webroot directory has three depth(e.g /usr/local/wwwroot), An
attacker can access arbitrary files as below. (Proof-of-concept)

http://www.target.com/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/foo/bar

# milw0rm.com [2008-08-11]

Trust: 1.0

sources: EXPLOIT-DB: 6229

EXPLOIT HASH

LOCAL

SOURCE

md5: c09ec2a05dc679b0bcf232595654b8c6
sha-1: 05e97cc9eca7b575e4ac45730bb1ff1bdc8bab47
sha-256: a4627d264413d5c228e2b45310a653f9683c2975d1a995ec77da67395ba2d871
md5: c09ec2a05dc679b0bcf232595654b8c6

Trust: 0.5

sources: PACKETSTORM: 69010

EXPLOIT LANGUAGE

txt

Trust: 1.0

sources: EXPLOIT-DB: 6229

PRICE

Free

Trust: 9.5

sources: BID: 22960 // BID: 25316 // BID: 25531 // BID: 24476 // BID: 30633 // PACKETSTORM: 69010 // PACKETSTORM: 92240 // PACKETSTORM: 57183 // PACKETSTORM: 56883 // PACKETSTORM: 55163 // PACKETSTORM: 58554 // PACKETSTORM: 74165 // PACKETSTORM: 82649 // EXPLOIT-DB: 6229 // EDBNET: 70551 // EDBNET: 69694 // EDBNET: 9239 // EDBNET: 69665 // EDBNET: 30495

TYPE

Input Validation Error

Trust: 1.5

sources: BID: 22960 // BID: 25316 // BID: 25531 // BID: 24476 // BID: 30633

TAGS

tag:exploit

Trust: 4.0

tag:xss

Trust: 2.0

tag:file inclusion

Trust: 1.5

tag:web

Trust: 1.0

tag:vulnerability

Trust: 1.0

tag:java

Trust: 0.5

tag:code execution

Trust: 0.5

tag:csrf

Trust: 0.5

sources: PACKETSTORM: 69010 // PACKETSTORM: 92240 // PACKETSTORM: 57183 // PACKETSTORM: 56883 // PACKETSTORM: 55163 // PACKETSTORM: 58554 // PACKETSTORM: 74165 // PACKETSTORM: 82649

CREDITS

Simon Ryeo

Trust: 1.5

sources: PACKETSTORM: 69010 // EXPLOIT-DB: 6229

EXTERNAL IDS

db:NVDid:CVE-2008-2938

Trust: 5.7

db:EXPLOIT-DBid:6229

Trust: 1.6

db:NVDid:CVE-2007-0450

Trust: 1.4

db:NVDid:CVE-2007-2449

Trust: 1.4

db:NVDid:CVE-2007-1355

Trust: 1.1

db:NVDid:CVE-2007-3386

Trust: 1.1

db:NVDid:CVE-2006-3835

Trust: 1.1

db:NVDid:CVE-2007-3382

Trust: 0.9

db:NVDid:CVE-2007-3385

Trust: 0.9

db:NVDid:CVE-2006-7196

Trust: 0.9

db:EDBNETid:70551

Trust: 0.6

db:EDBNETid:69694

Trust: 0.6

db:0DAYTODAYid:9239

Trust: 0.6

db:EDBNETid:9239

Trust: 0.6

db:NVDid:CVE-2007-1358

Trust: 0.6

db:NVDid:CVE-2007-1858

Trust: 0.6

db:NVDid:CVE-2008-0128

Trust: 0.6

db:NVDid:CVE-2005-3510

Trust: 0.6

db:NVDid:CVE-2006-7195

Trust: 0.6

db:NVDid:CVE-2007-2450

Trust: 0.6

db:NVDid:CVE-2005-2090

Trust: 0.6

db:EDBNETid:69665

Trust: 0.6

db:EDBNETid:30495

Trust: 0.6

db:PACKETSTORMid:69010

Trust: 0.5

db:PACKETSTORMid:92240

Trust: 0.5

db:PACKETSTORMid:57183

Trust: 0.5

db:PACKETSTORMid:56883

Trust: 0.5

db:PACKETSTORMid:55163

Trust: 0.5

db:PACKETSTORMid:58554

Trust: 0.5

db:PACKETSTORMid:74165

Trust: 0.5

db:PACKETSTORMid:82649

Trust: 0.5

db:BIDid:22960

Trust: 0.3

db:BIDid:25316

Trust: 0.3

db:NVDid:CVE-2007-4724

Trust: 0.3

db:BIDid:25531

Trust: 0.3

db:BIDid:24476

Trust: 0.3

db:CERT/CCid:VU#343355

Trust: 0.3

db:BIDid:30633

Trust: 0.3

sources: BID: 22960 // BID: 25316 // BID: 25531 // BID: 24476 // BID: 30633 // PACKETSTORM: 69010 // PACKETSTORM: 92240 // PACKETSTORM: 57183 // PACKETSTORM: 56883 // PACKETSTORM: 55163 // PACKETSTORM: 58554 // PACKETSTORM: 74165 // PACKETSTORM: 82649 // EXPLOIT-DB: 6229 // EDBNET: 70551 // EDBNET: 69694 // EDBNET: 9239 // EDBNET: 69665 // EDBNET: 30495

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2008-2938

Trust: 3.6

url:https://www.intelligentexploit.com

Trust: 1.8

url:https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid=197540

Trust: 1.2

url:http://tomcat.apache.org/

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2008-0261.html

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2008-0524.html

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2007-1069.html

Trust: 0.6

url:http://support.apple.com/kb/ht2163

Trust: 0.6

url:http://tomcat.apache.org/security-6.html

Trust: 0.6

url:http://download.novell.com/download?buildid=n5vszfht1vs

Trust: 0.6

url:http://www.novell.com/support/viewcontent.do?externalid=7006398

Trust: 0.6

url:https://0day.today/exploits/9239

Trust: 0.6

url:https://www.exploit-db.com/exploits/6229/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2007-2449

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2007-1355

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2007-0450

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2007-3386

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2006-3835

Trust: 0.5

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-200702e.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-239312-1

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0327.html

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2007-206.htm

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2007-0871.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0195.html

Trust: 0.3

url:http://www.blackberry.com/btsc/dynamickc.do?externalid=kb25966&sliceid=1&command=show&forward=nonthreadedkc&kcid=kb25966

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iz55562

Trust: 0.3

url:http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23/ca20090123-01-cohesion-tomcat-multiple-vulnerabilities.aspx

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0569.html

Trust: 0.3

url:http://www.dragoslungu.com/2007/06/07/bbpress-xss-vulnerability/

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0630.html

Trust: 0.3

url:http://bbpress.org/

Trust: 0.3

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-201003e.html

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/343355

Trust: 0.3

url:https://sourceforge.net/project/shownotes.php?release_id=626903&group_id=144774

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0648.html

Trust: 0.3

url:http://www.redhat.com/docs/en-us/jboss_enterprise_application_platform/4.2.0.cp04/html-single/readme/index.html

Trust: 0.3

url:http://harmony.apache.org/

Trust: 0.3

url:http://openjdk.java.net/

Trust: 0.3

url:http://java.sun.com/javase/6/webnotes/6u11.html

Trust: 0.3

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_oracle_java1

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2008-401.htm

Trust: 0.3

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_oracle_java

Trust: 0.3

sources: BID: 22960 // BID: 25316 // BID: 25531 // BID: 24476 // BID: 30633 // PACKETSTORM: 69010 // PACKETSTORM: 92240 // PACKETSTORM: 57183 // PACKETSTORM: 56883 // PACKETSTORM: 55163 // PACKETSTORM: 58554 // PACKETSTORM: 74165 // PACKETSTORM: 82649 // EXPLOIT-DB: 6229 // EDBNET: 70551 // EDBNET: 69694 // EDBNET: 9239 // EDBNET: 69665 // EDBNET: 30495

SOURCES

db:BIDid:22960
db:BIDid:25316
db:BIDid:25531
db:BIDid:24476
db:BIDid:30633
db:PACKETSTORMid:69010
db:PACKETSTORMid:92240
db:PACKETSTORMid:57183
db:PACKETSTORMid:56883
db:PACKETSTORMid:55163
db:PACKETSTORMid:58554
db:PACKETSTORMid:74165
db:PACKETSTORMid:82649
db:EXPLOIT-DBid:6229
db:EDBNETid:70551
db:EDBNETid:69694
db:EDBNETid:9239
db:EDBNETid:69665
db:EDBNETid:30495

LAST UPDATE DATE

2022-06-21T13:52:35.970000+00:00


SOURCES UPDATE DATE

db:BIDid:22960date:2010-08-05T20:45:00
db:BIDid:25316date:2015-03-19T09:17:00
db:BIDid:25531date:2015-03-19T09:14:00
db:BIDid:24476date:2015-03-19T08:19:00
db:BIDid:30633date:2015-04-13T22:13:00

SOURCES RELEASE DATE

db:BIDid:22960date:2007-03-14T00:00:00
db:BIDid:25316date:2007-08-14T00:00:00
db:BIDid:25531date:2007-09-04T00:00:00
db:BIDid:24476date:2007-06-14T00:00:00
db:BIDid:30633date:2008-08-11T00:00:00
db:PACKETSTORMid:69010date:2008-08-13T03:03:16
db:PACKETSTORMid:92240date:2010-07-28T17:52:44
db:PACKETSTORMid:57183date:2007-06-15T02:59:09
db:PACKETSTORMid:56883date:2007-05-22T01:45:13
db:PACKETSTORMid:55163date:2007-03-20T03:26:18
db:PACKETSTORMid:58554date:2007-08-14T17:52:16
db:PACKETSTORMid:74165date:2009-01-21T02:10:01
db:PACKETSTORMid:82649date:2009-11-17T00:59:14
db:EXPLOIT-DBid:6229date:2008-08-11T00:00:00
db:EDBNETid:70551date:2008-08-17T00:00:00
db:EDBNETid:69694date:2009-01-26T00:00:00
db:EDBNETid:9239date:2008-08-11T00:00:00
db:EDBNETid:69665date:2009-01-27T00:00:00
db:EDBNETid:30495date:2008-08-11T00:00:00