ID
VAR-E-200808-0268
CVE
cve_id: | CVE-2008-2370 | Trust: 1.9 |
EDB ID
32137
TITLE
Apache Tomcat 6.0.16 - 'RequestDispatcher' Information Disclosure - Multiple remote Exploit
Trust: 0.6
DESCRIPTION
Apache Tomcat 6.0.16 - 'RequestDispatcher' Information Disclosure. CVE-2008-2370CVE-47463 . remote exploit for Multiple platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.16 | Trust: 1.3 |
vendor: | apache | model: | tomcat | scope: | lte | version: | <=6.0.16 | Trust: 0.6 |
vendor: | wikid | model: | systems wikid server | scope: | eq | version: | 3.0.4 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter | scope: | eq | version: | 2.0.2 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter 2.5.update build | scope: | eq | version: | 31 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | eq | version: | 2.55 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter | scope: | eq | version: | 2.5 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | eq | version: | 2.0.25 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | eq | version: | 2.0.24 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | eq | version: | 2.0.23 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | eq | version: | 2.0.22 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | eq | version: | 2.0.21 | Trust: 0.3 |
vendor: | vmware | model: | vcenter | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | vmware | model: | server | scope: | eq | version: | 2.0.2 | Trust: 0.3 |
vendor: | vmware | model: | server | scope: | eq | version: | 2.0.1 | Trust: 0.3 |
vendor: | vmware | model: | server | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.0.3 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.0.2 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.5 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp2 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | sun | model: | solaris 9 x86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 9 sparc | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 10 x86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | solaris 10 sparc | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 99 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 96 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 95 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 92 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 91 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 90 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 89 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 88 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 87 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 86 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 85 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 84 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 83 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 82 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 81 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 80 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 78 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 77 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 76 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 68 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 67 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 64 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 61 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 59 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 57 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 50 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 39 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 36 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 29 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 22 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 19 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 13 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 100 | scope: | - | version: | - | Trust: 0.3 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 10.3 | Trust: 0.3 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 10.2 | Trust: 0.3 |
vendor: | redhat | model: | red hat network satellite server | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | redhat | model: | red hat network satellite server | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | redhat | model: | red hat network satellite (for rhel | scope: | eq | version: | 4)5.1 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform el5 | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform el4 | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform .cp03 | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop workstation client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | developer suite as4 | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | redhat | model: | certificate server | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | application server ws4 | scope: | eq | version: | 2 | Trust: 0.3 |
vendor: | redhat | model: | application server es4 | scope: | eq | version: | 2 | Trust: 0.3 |
vendor: | redhat | model: | application server as4 | scope: | eq | version: | 2 | Trust: 0.3 |
vendor: | pardus | model: | linux | scope: | eq | version: | 20080 | Trust: 0.3 |
vendor: | novell | model: | zenworks linux management | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2008.1 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2008.1 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2008.0 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2008.0 | Trust: 0.3 |
vendor: | hp | model: | xp p9000 performance advisor | scope: | eq | version: | 5.4.1 | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.31 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.11 | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage business application server enterprise | scope: | eq | version: | 8.0.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition 6.0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition a | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition a | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange enterprise edition | scope: | eq | version: | - | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.0.0.52 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.0.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.6 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.5 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.4 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.3 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.5 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.15 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.14 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.13 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.12 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.11 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.10 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.9 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.8 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.7 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.6 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.5 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.4 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.3 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.2 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.26 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.25 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.24 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.23 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.22 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.21 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.20 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.19 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.18 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.17 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.16 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.15 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.14 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.13 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.12 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.11 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.10 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.9 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.8 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.7 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.6 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.5 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.4 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.3 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.2 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.1 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.37 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.36 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.34 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.32 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.31 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.30 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.29 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.28 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.24 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.12 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.10 | Trust: 0.3 |
vendor: | apache | model: | tomcat beta | scope: | eq | version: | 4.1.9 | Trust: 0.3 |
vendor: | apache | model: | tomcat beta | scope: | eq | version: | 4.1.3 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.3 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | apache | model: | ode | scope: | eq | version: | 1.3.2 | Trust: 0.3 |
vendor: | apache | model: | ode | scope: | eq | version: | 1.0 | Trust: 0.3 |
vendor: | wikid | model: | systems wikid server | scope: | ne | version: | 3.0.5 | Trust: 0.3 |
vendor: | vmware | model: | virtualcenter update | scope: | ne | version: | 2.56 | Trust: 0.3 |
vendor: | vmware | model: | vcenter update | scope: | ne | version: | 4.01 | Trust: 0.3 |
vendor: | sun | model: | opensolaris build snv 101 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform .cp04 | scope: | ne | version: | 4.2 | Trust: 0.3 |
vendor: | hp | model: | xp p9000 performance advisor | scope: | ne | version: | 5.5.1 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | ne | version: | 6.0.18 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | ne | version: | 5.5.27 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | ne | version: | 4.1.38 | Trust: 0.3 |
vendor: | apache | model: | ode | scope: | ne | version: | 1.3.3 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/30494/info
Apache Tomcat is prone to a remote information-disclosure vulnerability.
Remote attackers can exploit this issue to obtain the contents of sensitive files stored on the server. Information obtained may lead to further attacks.
The following versions are affected:
Tomcat 4.1.0 through 4.1.37
Tomcat 5.5.0 through 5.5.26
Tomcat 6.0.0 through 6.0.16
Tomcat 3.x, 4.0.x, and 5.0.x may also be affected.
http://www.example.com/page.jsp?blah=/../WEB-INF/web.xml
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
'RequestDispatcher' Information Disclosure
Trust: 1.0
CREDITS
Stefano Di Paola
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2008-2370 | Trust: 1.9 |
db: | BID | id: | 30494 | Trust: 1.9 |
db: | EXPLOIT-DB | id: | 32137 | Trust: 1.6 |
db: | EDBNET | id: | 53688 | Trust: 0.6 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2008-2370 | Trust: 1.6 |
url: | https://www.securityfocus.com/bid/30494/info | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/32137/ | Trust: 0.6 |
url: | http://lists.vmware.com/pipermail/security-announce/2009/000068.html | Trust: 0.3 |
url: | https://sourceforge.net/project/shownotes.php?release_id=626903&group_id=144774 | Trust: 0.3 |
url: | http://tomcat.apache.org/ | Trust: 0.3 |
url: | http://download.novell.com/download?buildid=n5vszfht1vs | Trust: 0.3 |
url: | http://tomcat.apache.org/security-5.html | Trust: 0.3 |
url: | http://mail-archives.apache.org/mod_mbox/ode-user/200908.mbox/%3cfbdc6a970908072141w20a7a9d9ka1f896ad8073dffb@mail.gmail.com%3e | Trust: 0.3 |
url: | http://rhn.redhat.com/errata/rhsa-2008-0648.html | Trust: 0.3 |
url: | http://tomcat.apache.org/security-4.html | Trust: 0.3 |
url: | http://tomcat.apache.org/security-6.html | Trust: 0.3 |
url: | http://www.redhat.com/docs/en-us/jboss_enterprise_application_platform/4.2.0.cp04/html-single/readme/index.html | Trust: 0.3 |
url: | http://support.avaya.com/elmodocs2/security/asa-2008-401.htm | Trust: 0.3 |
url: | http://www.novell.com/support/viewcontent.do?externalid=7006398 | Trust: 0.3 |
url: | http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html | Trust: 0.3 |
url: | http://sunsolve.sun.com/search/document.do?assetkey=1-66-251986-1 | Trust: 0.3 |
SOURCES
db: | BID | id: | 30494 |
db: | EXPLOIT-DB | id: | 32137 |
db: | EDBNET | id: | 53688 |
LAST UPDATE DATE
2022-07-27T09:16:59.021000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 30494 | date: | 2015-05-07T17:17:00 |
SOURCES RELEASE DATE
db: | BID | id: | 30494 | date: | 2008-08-01T00:00:00 |
db: | EXPLOIT-DB | id: | 32137 | date: | 2008-08-01T00:00:00 |
db: | EDBNET | id: | 53688 | date: | 2008-08-01T00:00:00 |