Versio.io

CVE-2006-7195

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 19-04-2007 02:00
Last modified: - 19-04-2007 02:00
Total changes: - 10

Description

CVE-2006-7195 tomcat XSS in example webapps

Common Vulnerability Scoring System (CVSS)

-
-
Attack complexity
-
Attack vector
-
Availability
-
Confidentiality
-
Integrity
-
Privileges required
-
Scope
-
User interaction
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=jakarta-commons-modeler-0 AND versionEndExcluding=2.0-3jpp_3rh
vendor=Red Hat Enterprise Linux AND product=rhel_developer_suite AND version=3
AND
product=Tomcat AND versionEndExcluding=5.5.23-0jpp_6rh
vendor=Red Hat Enterprise Linux AND product=rhel_developer_suite AND version=3
AND
product=jakarta-commons-modeler-0 AND versionEndExcluding=1.1-8jpp.1.0.2.el5
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=Tomcat AND versionEndExcluding=5.5.23-0jpp.1.0.3.el5
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=jabberd-0 AND versionEndExcluding=2.0s10-3.38.rhn
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=java-1.4.2-ibm-0 AND versionEndExcluding=1.4.2.10-1jpp.2.el4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=jfreechart-0 AND versionEndExcluding=0.9.20-3.rhn
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=openmotif21-0 AND versionEndExcluding=2.1.30-11.RHEL4.6
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=perl-Crypt-CBC-0 AND versionEndExcluding=2.24-1.el4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=rhn-apache-0 AND versionEndExcluding=1.3.27-36.rhn.rhel4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=rhn-modjk-0 AND versionEndExcluding=1.2.23-2rhn.rhel4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=rhn-modperl-0 AND versionEndExcluding=1.29-16.rhel4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=rhn-modssl-0 AND versionEndExcluding=2.8.12-8.rhn.10.rhel4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=Tomcat AND versionEndExcluding=5.0.30-0jpp_10rh
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=jabberd-0 AND versionEndExcluding=2.0s10-3.37.rhn
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=java-1.4.2-ibm-0 AND versionEndExcluding=1.4.2.10-1jpp.2.el3
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=jfreechart-0 AND versionEndExcluding=0.9.20-3.rhn
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=openmotif21-0 AND versionEndExcluding=2.1.30-9.RHEL3.8
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=perl-Crypt-CBC-0 AND versionEndExcluding=2.24-1.el3
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=rhn-apache-0 AND versionEndExcluding=1.3.27-36.rhn.rhel3
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=rhn-modjk-0 AND versionEndExcluding=1.2.23-2rhn.rhel3
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=rhn-modperl-0 AND versionEndExcluding=1.29-16.rhel3
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=rhn-modssl-0 AND versionEndExcluding=2.8.12-8.rhn.10.rhel3
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=Tomcat AND versionEndExcluding=5.0.30-0jpp_10rh
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=4.2
AND
product=jabberd-0 AND versionEndExcluding=2.0s10-3.38.rhn
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=java-1.4.2-ibm-0 AND versionEndExcluding=1.4.2.10-1jpp.2.el4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=jfreechart-0 AND versionEndExcluding=0.9.20-3.rhn
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=openmotif21-0 AND versionEndExcluding=2.1.30-11.RHEL4.6
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=perl-Crypt-CBC-0 AND versionEndExcluding=2.24-1.el4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=rhn-apache-0 AND versionEndExcluding=1.3.27-36.rhn.rhel4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=rhn-modjk-0 AND versionEndExcluding=1.2.23-2rhn.rhel4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=rhn-modperl-0 AND versionEndExcluding=1.29-16.rhel4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=rhn-modssl-0 AND versionEndExcluding=2.8.12-8.rhn.10.rhel4
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=Tomcat AND versionEndExcluding=5.0.30-0jpp_10rh
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.0
AND
product=Tomcat AND versionEndExcluding=5.0.30-0jpp_5rh
vendor=Red Hat Enterprise Linux AND product=rhel_application_server AND version=1
AND
product=jakarta-commons-modeler-0 AND versionEndExcluding=2.0-3jpp_2rh
vendor=Red Hat Enterprise Linux AND product=rhel_application_server AND version=2
AND
product=Tomcat AND versionEndExcluding=5.5.23-0jpp_4rh.3
vendor=Red Hat Enterprise Linux AND product=rhel_application_server AND version=2
 

Reference

 


Keywords

REDHAT

 

CVE-2006-7195

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.