CVE-2007-5333
Apache Tomcat Cookie Value Injection Vulnerability
Description
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
INFO
Published Date :
Feb. 12, 2008, 1 a.m.
Last Modified :
Nov. 21, 2024, 12:37 a.m.
Source :
[email protected]
Remotely Exploitable :
Yes !
Impact Score :
2.9
Exploitability Score :
10.0
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2007-5333
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2007-5333
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2007-5333
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference http://jvn.jp/jp/JVN%2309470767/index.html Added Reference http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html Added Reference http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html Added Reference http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html Added Reference http://marc.info/?l=bugtraq&m=139344343412337&w=2 Added Reference http://secunia.com/advisories/28878 Added Reference http://secunia.com/advisories/28884 Added Reference http://secunia.com/advisories/28915 Added Reference http://secunia.com/advisories/29711 Added Reference http://secunia.com/advisories/30676 Added Reference http://secunia.com/advisories/30802 Added Reference http://secunia.com/advisories/32036 Added Reference http://secunia.com/advisories/32222 Added Reference http://secunia.com/advisories/33330 Added Reference http://secunia.com/advisories/37460 Added Reference http://secunia.com/advisories/44183 Added Reference http://secunia.com/advisories/57126 Added Reference http://security.gentoo.org/glsa/glsa-200804-10.xml Added Reference http://securityreason.com/securityalert/3636 Added Reference http://support.apple.com/kb/HT2163 Added Reference http://support.apple.com/kb/HT3216 Added Reference http://tomcat.apache.org/security-4.html Added Reference http://tomcat.apache.org/security-5.html Added Reference http://tomcat.apache.org/security-6.html Added Reference http://www.mandriva.com/security/advisories?name=MDVSA-2009:018 Added Reference http://www.mandriva.com/security/advisories?name=MDVSA-2010:176 Added Reference http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html Added Reference http://www.securityfocus.com/archive/1/487822/100/0/threaded Added Reference http://www.securityfocus.com/archive/1/507985/100/0/threaded Added Reference http://www.securityfocus.com/bid/27706 Added Reference http://www.securityfocus.com/bid/31681 Added Reference http://www.vmware.com/security/advisories/VMSA-2008-0010.html Added Reference http://www.vmware.com/security/advisories/VMSA-2009-0016.html Added Reference http://www.vupen.com/english/advisories/2008/0488 Added Reference http://www.vupen.com/english/advisories/2008/1856/references Added Reference http://www.vupen.com/english/advisories/2008/1981/references Added Reference http://www.vupen.com/english/advisories/2008/2690 Added Reference http://www.vupen.com/english/advisories/2008/2780 Added Reference http://www.vupen.com/english/advisories/2009/3316 Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg24018932 Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg27012047 Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg27012048 Added Reference http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133 Added Reference http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991 Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=532111 Added Reference https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E Added Reference https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E Added Reference https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E Added Reference https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E Added Reference https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E Added Reference https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E Added Reference https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11177 Added Reference https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html Added Reference https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html -
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
CVE Modified by [email protected]
Nov. 07, 2023
Action Type Old Value New Value Changed Description Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385. Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385. -
CVE Modified by [email protected]
Feb. 13, 2023
Action Type Old Value New Value Changed Description Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385. Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385. Removed Reference https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E [Mailing List, Vendor Advisory] Removed Reference https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E [Mailing List, Vendor Advisory] Removed Reference https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E [Mailing List, Vendor Advisory] Removed Reference https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E [Mailing List, Vendor Advisory] Removed Reference https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E [Mailing List, Vendor Advisory] Removed Reference https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E [Mailing List, Vendor Advisory] Removed Reference https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E [Mailing List, Vendor Advisory] Added Reference https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E [No Types Assigned] -
Modified Analysis by [email protected]
Feb. 03, 2022
Action Type Old Value New Value Changed Reference Type http://jvn.jp/jp/JVN%2309470767/index.html No Types Assigned http://jvn.jp/jp/JVN%2309470767/index.html Third Party Advisory, VDB Entry Changed Reference Type http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html No Types Assigned http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html Mailing List, Third Party Advisory Changed Reference Type http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html No Types Assigned http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html Mailing List, Third Party Advisory Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html Third Party Advisory Changed Reference Type http://marc.info/?l=bugtraq&m=139344343412337&w=2 No Types Assigned http://marc.info/?l=bugtraq&m=139344343412337&w=2 Mailing List, Third Party Advisory Changed Reference Type http://secunia.com/advisories/28878 No Types Assigned http://secunia.com/advisories/28878 Broken Link Changed Reference Type http://secunia.com/advisories/28884 No Types Assigned http://secunia.com/advisories/28884 Broken Link Changed Reference Type http://secunia.com/advisories/28915 No Types Assigned http://secunia.com/advisories/28915 Broken Link Changed Reference Type http://secunia.com/advisories/29711 No Types Assigned http://secunia.com/advisories/29711 Broken Link Changed Reference Type http://secunia.com/advisories/30676 No Types Assigned http://secunia.com/advisories/30676 Broken Link Changed Reference Type http://secunia.com/advisories/30802 No Types Assigned http://secunia.com/advisories/30802 Broken Link Changed Reference Type http://secunia.com/advisories/32036 No Types Assigned http://secunia.com/advisories/32036 Broken Link Changed Reference Type http://secunia.com/advisories/32222 No Types Assigned http://secunia.com/advisories/32222 Broken Link Changed Reference Type http://secunia.com/advisories/33330 No Types Assigned http://secunia.com/advisories/33330 Broken Link Changed Reference Type http://secunia.com/advisories/37460 No Types Assigned http://secunia.com/advisories/37460 Broken Link Changed Reference Type http://secunia.com/advisories/44183 No Types Assigned http://secunia.com/advisories/44183 Broken Link Changed Reference Type http://secunia.com/advisories/57126 No Types Assigned http://secunia.com/advisories/57126 Broken Link Changed Reference Type http://security.gentoo.org/glsa/glsa-200804-10.xml No Types Assigned http://security.gentoo.org/glsa/glsa-200804-10.xml Broken Link Changed Reference Type http://securityreason.com/securityalert/3636 No Types Assigned http://securityreason.com/securityalert/3636 Broken Link Changed Reference Type http://support.apple.com/kb/HT2163 No Types Assigned http://support.apple.com/kb/HT2163 Third Party Advisory Changed Reference Type http://support.apple.com/kb/HT3216 No Types Assigned http://support.apple.com/kb/HT3216 Third Party Advisory Changed Reference Type http://tomcat.apache.org/security-4.html No Types Assigned http://tomcat.apache.org/security-4.html Vendor Advisory Changed Reference Type http://tomcat.apache.org/security-5.html No Types Assigned http://tomcat.apache.org/security-5.html Vendor Advisory Changed Reference Type http://tomcat.apache.org/security-6.html No Types Assigned http://tomcat.apache.org/security-6.html Vendor Advisory Changed Reference Type http://www.mandriva.com/security/advisories?name=MDVSA-2009:018 No Types Assigned http://www.mandriva.com/security/advisories?name=MDVSA-2009:018 Third Party Advisory Changed Reference Type http://www.mandriva.com/security/advisories?name=MDVSA-2010:176 No Types Assigned http://www.mandriva.com/security/advisories?name=MDVSA-2010:176 Third Party Advisory Changed Reference Type http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html No Types Assigned http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html Third Party Advisory Changed Reference Type http://www.securityfocus.com/archive/1/487822/100/0/threaded No Types Assigned http://www.securityfocus.com/archive/1/487822/100/0/threaded Third Party Advisory, VDB Entry Changed Reference Type http://www.securityfocus.com/archive/1/507985/100/0/threaded No Types Assigned http://www.securityfocus.com/archive/1/507985/100/0/threaded Third Party Advisory, VDB Entry Changed Reference Type http://www.securityfocus.com/bid/27706 Exploit, Patch http://www.securityfocus.com/bid/27706 Exploit, Patch, Third Party Advisory, VDB Entry Changed Reference Type http://www.securityfocus.com/bid/31681 No Types Assigned http://www.securityfocus.com/bid/31681 Third Party Advisory, VDB Entry Changed Reference Type http://www.vmware.com/security/advisories/VMSA-2008-0010.html No Types Assigned http://www.vmware.com/security/advisories/VMSA-2008-0010.html Third Party Advisory Changed Reference Type http://www.vmware.com/security/advisories/VMSA-2009-0016.html No Types Assigned http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory Changed Reference Type http://www.vupen.com/english/advisories/2008/0488 No Types Assigned http://www.vupen.com/english/advisories/2008/0488 URL Repurposed Changed Reference Type http://www.vupen.com/english/advisories/2008/1856/references No Types Assigned http://www.vupen.com/english/advisories/2008/1856/references URL Repurposed Changed Reference Type http://www.vupen.com/english/advisories/2008/1981/references No Types Assigned http://www.vupen.com/english/advisories/2008/1981/references URL Repurposed Changed Reference Type http://www.vupen.com/english/advisories/2008/2690 No Types Assigned http://www.vupen.com/english/advisories/2008/2690 URL Repurposed Changed Reference Type http://www.vupen.com/english/advisories/2008/2780 No Types Assigned http://www.vupen.com/english/advisories/2008/2780 URL Repurposed Changed Reference Type http://www.vupen.com/english/advisories/2009/3316 No Types Assigned http://www.vupen.com/english/advisories/2009/3316 URL Repurposed Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg24018932 No Types Assigned http://www-01.ibm.com/support/docview.wss?uid=swg24018932 Third Party Advisory Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg27012047 No Types Assigned http://www-01.ibm.com/support/docview.wss?uid=swg27012047 Third Party Advisory Changed Reference Type http://www-01.ibm.com/support/docview.wss?uid=swg27012048 No Types Assigned http://www-01.ibm.com/support/docview.wss?uid=swg27012048 Third Party Advisory Changed Reference Type http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133 No Types Assigned http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133 Third Party Advisory Changed Reference Type http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991 No Types Assigned http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991 Third Party Advisory Changed Reference Type https://bugzilla.redhat.com/show_bug.cgi?id=532111 No Types Assigned https://bugzilla.redhat.com/show_bug.cgi?id=532111 Issue Tracking, Third Party Advisory Changed Reference Type https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E Mailing List, Vendor Advisory Changed Reference Type https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E Mailing List, Vendor Advisory Changed Reference Type https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E Mailing List, Vendor Advisory Changed Reference Type https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E Mailing List, Vendor Advisory Changed Reference Type https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E Mailing List, Vendor Advisory Changed Reference Type https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E Mailing List, Vendor Advisory Changed Reference Type https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E No Types Assigned https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E Mailing List, Vendor Advisory Changed Reference Type https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11177 No Types Assigned https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11177 Tool Signature Changed Reference Type https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html No Types Assigned https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html Third Party Advisory Changed Reference Type https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html No Types Assigned https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html Third Party Advisory Changed CPE Configuration OR *cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* *cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:4.1:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:4.1.32:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:4.1.34:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:4.1.37:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:5.0:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:5.1:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:5.2:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:5.3:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:5.4:*:*:*:*:*:*:* *cpe:2.3:a:apache_software_foundation:tomcat:5.5:*:*:*:*:*:*:* OR *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 4.1.0 up to (including) 4.1.36 *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 5.5.0 up to (including) 5.5.25 *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (including) 6.0.14 -
CVE Modified by [email protected]
Feb. 13, 2020
Action Type Old Value New Value Added Reference https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E [No Types Assigned] -
CVE Modified by [email protected]
Feb. 03, 2020
Action Type Old Value New Value Added Reference https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E [No Types Assigned] -
CVE Modified by [email protected]
Mar. 25, 2019
Action Type Old Value New Value Added Reference https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E [No Types Assigned] -
CVE Modified by [email protected]
Mar. 21, 2019
Action Type Old Value New Value Added Reference https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E [No Types Assigned] Added Reference https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E [No Types Assigned] -
CVE Modified by [email protected]
Oct. 15, 2018
Action Type Old Value New Value Removed Reference http://www.securityfocus.com/archive/1/archive/1/487822/100/0/threaded [Exploit] Removed Reference http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded [No Types Assigned] Added Reference http://www.securityfocus.com/archive/1/507985/100/0/threaded [No Types Assigned] Added Reference http://www.securityfocus.com/archive/1/487822/100/0/threaded [No Types Assigned] -
CVE Modified by [email protected]
Sep. 29, 2017
Action Type Old Value New Value Removed Reference http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11177 [No Types Assigned] Added Reference https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11177 [No Types Assigned] -
Initial Analysis by [email protected]
Feb. 12, 2008
Action Type Old Value New Value
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2007-5333
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2007-5333
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
66.89 }} 36.66%
score
0.98100
percentile