CVE-2013-0346
15.02.2014, 14:57
Apache Tomcat 7.x uses world-readable permissions for the log directory and its files, which might allow local users to obtain sensitive information by reading a file. NOTE: One Tomcat distributor has stated "The tomcat log directory does not contain any sensitive information."Enginsight
| Vendor | Product | Version |
|---|---|---|
| apache | tomcat | 7.0.0 |
| apache | tomcat | 7.0.0:beta |
| apache | tomcat | 7.0.1 |
| apache | tomcat | 7.0.2 |
| apache | tomcat | 7.0.2:beta |
| apache | tomcat | 7.0.3 |
| apache | tomcat | 7.0.4 |
| apache | tomcat | 7.0.4:beta |
| apache | tomcat | 7.0.5 |
| apache | tomcat | 7.0.6 |
| apache | tomcat | 7.0.7 |
| apache | tomcat | 7.0.8 |
| apache | tomcat | 7.0.9 |
| apache | tomcat | 7.0.10 |
| apache | tomcat | 7.0.11 |
| apache | tomcat | 7.0.12 |
| apache | tomcat | 7.0.13 |
| apache | tomcat | 7.0.14 |
| apache | tomcat | 7.0.15 |
| apache | tomcat | 7.0.16 |
| apache | tomcat | 7.0.17 |
| apache | tomcat | 7.0.18 |
| apache | tomcat | 7.0.19 |
| apache | tomcat | 7.0.20 |
| apache | tomcat | 7.0.21 |
| apache | tomcat | 7.0.22 |
| apache | tomcat | 7.0.23 |
| apache | tomcat | 7.0.24 |
| apache | tomcat | 7.0.25 |
| apache | tomcat | 7.0.26 |
| apache | tomcat | 7.0.27 |
| apache | tomcat | 7.0.28 |
| apache | tomcat | 7.0.29 |
| apache | tomcat | 7.0.30 |
| apache | tomcat | 7.0.31 |
| apache | tomcat | 7.0.32 |
| apache | tomcat | 7.0.33 |
| apache | tomcat | 7.0.34 |
| apache | tomcat | 7.0.35 |
| apache | tomcat | 7.0.36 |
| apache | tomcat | 7.0.37 |
| apache | tomcat | 7.0.38 |
| apache | tomcat | 7.0.39 |
| apache | tomcat | 7.0.40 |
| apache | tomcat | 7.0.41 |
| apache | tomcat | 7.0.42 |
| apache | tomcat | 7.0.43 |
| apache | tomcat | 7.0.44 |
| apache | tomcat | 7.0.45 |
| apache | tomcat | 7.0.46 |
| apache | tomcat | 7.0.47 |
| apache | tomcat | 7.0.48 |
| apache | tomcat | 7.0.49 |
| apache | tomcat | 7.0.50 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration