CVE-2013-4590
26.02.2014, 14:55
Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.Enginsight
Vendor | Product | Version |
---|---|---|
apache | tomcat | 8.0.0:rc1 |
apache | tomcat | 8.0.0:rc2 |
apache | tomcat | 8.0.0:rc3 |
apache | tomcat | 8.0.0:rc4 |
apache | tomcat | 8.0.0:rc5 |
apache | tomcat | 8.0.0:rc6 |
apache | tomcat | 8.0.0:rc7 |
apache | tomcat | 8.0.0:rc8 |
apache | tomcat | 8.0.0:rc9 |
debian | debian_linux | 7.0 |
apache | tomcat | 𝑥 ≤ 6.0.37 |
apache | tomcat | 1.1.3 |
apache | tomcat | 3.0 |
apache | tomcat | 3.1 |
apache | tomcat | 3.1.1 |
apache | tomcat | 3.2 |
apache | tomcat | 3.2.1 |
apache | tomcat | 3.2.2 |
apache | tomcat | 3.2.2:beta2 |
apache | tomcat | 3.2.3 |
apache | tomcat | 3.2.4 |
apache | tomcat | 3.3 |
apache | tomcat | 3.3.1 |
apache | tomcat | 3.3.1a:a |
apache | tomcat | 3.3.2 |
apache | tomcat | 4.0.0 |
apache | tomcat | 4.0.1 |
apache | tomcat | 4.0.2 |
apache | tomcat | 4.0.3 |
apache | tomcat | 4.0.4 |
apache | tomcat | 4.0.5 |
apache | tomcat | 4.0.6 |
apache | tomcat | 4.1.0 |
apache | tomcat | 4.1.1 |
apache | tomcat | 4.1.2 |
apache | tomcat | 4.1.3 |
apache | tomcat | 4.1.3:beta |
apache | tomcat | 4.1.9:beta |
apache | tomcat | 4.1.10 |
apache | tomcat | 4.1.12 |
apache | tomcat | 4.1.15 |
apache | tomcat | 4.1.24 |
apache | tomcat | 4.1.28 |
apache | tomcat | 4.1.29 |
apache | tomcat | 4.1.31 |
apache | tomcat | 4.1.36 |
apache | tomcat | 5.0.0 |
apache | tomcat | 5.0.1 |
apache | tomcat | 5.0.2 |
apache | tomcat | 5.0.3 |
apache | tomcat | 5.0.4 |
apache | tomcat | 5.0.5 |
apache | tomcat | 5.0.6 |
apache | tomcat | 5.0.7 |
apache | tomcat | 5.0.8 |
apache | tomcat | 5.0.9 |
apache | tomcat | 5.0.10 |
apache | tomcat | 5.0.11 |
apache | tomcat | 5.0.12 |
apache | tomcat | 5.0.13 |
apache | tomcat | 5.0.14 |
apache | tomcat | 5.0.15 |
apache | tomcat | 5.0.16 |
apache | tomcat | 5.0.17 |
apache | tomcat | 5.0.18 |
apache | tomcat | 5.0.19 |
apache | tomcat | 5.0.21 |
apache | tomcat | 5.0.22 |
apache | tomcat | 5.0.23 |
apache | tomcat | 5.0.24 |
apache | tomcat | 5.0.25 |
apache | tomcat | 5.0.26 |
apache | tomcat | 5.0.27 |
apache | tomcat | 5.0.28 |
apache | tomcat | 5.0.29 |
apache | tomcat | 5.0.30 |
apache | tomcat | 5.5.0 |
apache | tomcat | 5.5.1 |
apache | tomcat | 5.5.2 |
apache | tomcat | 5.5.3 |
apache | tomcat | 5.5.4 |
apache | tomcat | 5.5.5 |
apache | tomcat | 5.5.6 |
apache | tomcat | 5.5.7 |
apache | tomcat | 5.5.8 |
apache | tomcat | 5.5.9 |
apache | tomcat | 5.5.10 |
apache | tomcat | 5.5.11 |
apache | tomcat | 5.5.12 |
apache | tomcat | 5.5.13 |
apache | tomcat | 5.5.14 |
apache | tomcat | 5.5.15 |
apache | tomcat | 5.5.16 |
apache | tomcat | 5.5.17 |
apache | tomcat | 5.5.18 |
apache | tomcat | 5.5.19 |
apache | tomcat | 5.5.20 |
apache | tomcat | 5.5.21 |
apache | tomcat | 5.5.22 |
apache | tomcat | 5.5.23 |
apache | tomcat | 5.5.24 |
apache | tomcat | 5.5.25 |
apache | tomcat | 5.5.26 |
apache | tomcat | 5.5.27 |
apache | tomcat | 5.5.28 |
apache | tomcat | 5.5.29 |
apache | tomcat | 5.5.30 |
apache | tomcat | 5.5.31 |
apache | tomcat | 5.5.32 |
apache | tomcat | 5.5.33 |
apache | tomcat | 5.5.34 |
apache | tomcat | 5.5.35 |
apache | tomcat | 6.0 |
apache | tomcat | 6.0.0 |
apache | tomcat | 6.0.0:alpha |
apache | tomcat | 6.0.1 |
apache | tomcat | 6.0.1:alpha |
apache | tomcat | 6.0.2 |
apache | tomcat | 6.0.2:alpha |
apache | tomcat | 6.0.2:beta |
apache | tomcat | 6.0.3 |
apache | tomcat | 6.0.10 |
apache | tomcat | 6.0.11 |
apache | tomcat | 6.0.12 |
apache | tomcat | 6.0.13 |
apache | tomcat | 6.0.14 |
apache | tomcat | 6.0.15 |
apache | tomcat | 6.0.16 |
apache | tomcat | 6.0.17 |
apache | tomcat | 6.0.18 |
apache | tomcat | 6.0.19 |
apache | tomcat | 6.0.20 |
apache | tomcat | 6.0.24 |
apache | tomcat | 6.0.26 |
apache | tomcat | 6.0.27 |
apache | tomcat | 6.0.28 |
apache | tomcat | 6.0.29 |
apache | tomcat | 6.0.30 |
apache | tomcat | 6.0.31 |
apache | tomcat | 6.0.32 |
apache | tomcat | 6.0.33 |
apache | tomcat | 6.0.35 |
apache | tomcat | 6.0.36 |
apache | tomcat | 7.0.0 |
apache | tomcat | 7.0.0:beta |
apache | tomcat | 7.0.1 |
apache | tomcat | 7.0.2 |
apache | tomcat | 7.0.2:beta |
apache | tomcat | 7.0.3 |
apache | tomcat | 7.0.4 |
apache | tomcat | 7.0.4:beta |
apache | tomcat | 7.0.10 |
apache | tomcat | 7.0.11 |
apache | tomcat | 7.0.12 |
apache | tomcat | 7.0.13 |
apache | tomcat | 7.0.14 |
apache | tomcat | 7.0.15 |
apache | tomcat | 7.0.16 |
apache | tomcat | 7.0.17 |
apache | tomcat | 7.0.18 |
apache | tomcat | 7.0.19 |
apache | tomcat | 7.0.20 |
apache | tomcat | 7.0.21 |
apache | tomcat | 7.0.22 |
apache | tomcat | 7.0.23 |
apache | tomcat | 7.0.24 |
apache | tomcat | 7.0.25 |
apache | tomcat | 7.0.26 |
apache | tomcat | 7.0.27 |
apache | tomcat | 7.0.28 |
apache | tomcat | 7.0.29 |
apache | tomcat | 7.0.30 |
apache | tomcat | 7.0.31 |
apache | tomcat | 7.0.32 |
apache | tomcat | 7.0.33 |
apache | tomcat | 7.0.34 |
apache | tomcat | 7.0.35 |
apache | tomcat | 7.0.36 |
apache | tomcat | 7.0.37 |
apache | tomcat | 7.0.38 |
apache | tomcat | 7.0.39 |
apache | tomcat | 7.0.40 |
apache | tomcat | 7.0.41 |
apache | tomcat | 7.0.42 |
apache | tomcat | 7.0.43 |
apache | tomcat | 7.0.44 |
apache | tomcat | 7.0.45 |
apache | tomcat | 7.0.46 |
apache | tomcat | 7.0.50 |
oracle | solaris | 11.2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
tomcat6 |
| ||||||||||||||||||||||||||||||||||||||
tomcat7 |
|
Common Weakness Enumeration
References