Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2007-3386

Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.461
EPSS Ranking 97.5%
CVSS Severity
CVSS v2 Score 4.3
References
Products affected by CVE-2007-3386
  • Apache » Tomcat » Version: 5.5.0
    cpe:2.3:a:apache:tomcat:5.5.0
  • Apache » Tomcat » Version: 5.5.1
    cpe:2.3:a:apache:tomcat:5.5.1
  • Apache » Tomcat » Version: 5.5.10
    cpe:2.3:a:apache:tomcat:5.5.10
  • Apache » Tomcat » Version: 5.5.11
    cpe:2.3:a:apache:tomcat:5.5.11
  • Apache » Tomcat » Version: 5.5.12
    cpe:2.3:a:apache:tomcat:5.5.12
  • Apache » Tomcat » Version: 5.5.13
    cpe:2.3:a:apache:tomcat:5.5.13
  • Apache » Tomcat » Version: 5.5.14
    cpe:2.3:a:apache:tomcat:5.5.14
  • Apache » Tomcat » Version: 5.5.15
    cpe:2.3:a:apache:tomcat:5.5.15
  • Apache » Tomcat » Version: 5.5.16
    cpe:2.3:a:apache:tomcat:5.5.16
  • Apache » Tomcat » Version: 5.5.17
    cpe:2.3:a:apache:tomcat:5.5.17
  • Apache » Tomcat » Version: 5.5.18
    cpe:2.3:a:apache:tomcat:5.5.18
  • Apache » Tomcat » Version: 5.5.19
    cpe:2.3:a:apache:tomcat:5.5.19
  • Apache » Tomcat » Version: 5.5.2
    cpe:2.3:a:apache:tomcat:5.5.2
  • Apache » Tomcat » Version: 5.5.20
    cpe:2.3:a:apache:tomcat:5.5.20
  • Apache » Tomcat » Version: 5.5.21
    cpe:2.3:a:apache:tomcat:5.5.21
  • Apache » Tomcat » Version: 5.5.22
    cpe:2.3:a:apache:tomcat:5.5.22
  • Apache » Tomcat » Version: 5.5.23
    cpe:2.3:a:apache:tomcat:5.5.23
  • Apache » Tomcat » Version: 5.5.24
    cpe:2.3:a:apache:tomcat:5.5.24
  • Apache » Tomcat » Version: 5.5.3
    cpe:2.3:a:apache:tomcat:5.5.3
  • Apache » Tomcat » Version: 5.5.4
    cpe:2.3:a:apache:tomcat:5.5.4
  • Apache » Tomcat » Version: 5.5.5
    cpe:2.3:a:apache:tomcat:5.5.5
  • Apache » Tomcat » Version: 5.5.6
    cpe:2.3:a:apache:tomcat:5.5.6
  • Apache » Tomcat » Version: 5.5.7
    cpe:2.3:a:apache:tomcat:5.5.7
  • Apache » Tomcat » Version: 5.5.8
    cpe:2.3:a:apache:tomcat:5.5.8
  • Apache » Tomcat » Version: 5.5.9
    cpe:2.3:a:apache:tomcat:5.5.9
  • Apache » Tomcat » Version: 6.0.0
    cpe:2.3:a:apache:tomcat:6.0.0
  • Apache » Tomcat » Version: 6.0.1
    cpe:2.3:a:apache:tomcat:6.0.1
  • Apache » Tomcat » Version: 6.0.10
    cpe:2.3:a:apache:tomcat:6.0.10
  • Apache » Tomcat » Version: 6.0.11
    cpe:2.3:a:apache:tomcat:6.0.11
  • Apache » Tomcat » Version: 6.0.12
    cpe:2.3:a:apache:tomcat:6.0.12
  • Apache » Tomcat » Version: 6.0.13
    cpe:2.3:a:apache:tomcat:6.0.13
  • Apache » Tomcat » Version: 6.0.2
    cpe:2.3:a:apache:tomcat:6.0.2
  • Apache » Tomcat » Version: 6.0.3
    cpe:2.3:a:apache:tomcat:6.0.3
  • Apache » Tomcat » Version: 6.0.4
    cpe:2.3:a:apache:tomcat:6.0.4
  • Apache » Tomcat » Version: 6.0.5
    cpe:2.3:a:apache:tomcat:6.0.5
  • Apache » Tomcat » Version: 6.0.6
    cpe:2.3:a:apache:tomcat:6.0.6
  • Apache » Tomcat » Version: 6.0.7
    cpe:2.3:a:apache:tomcat:6.0.7
  • Apache » Tomcat » Version: 6.0.8
    cpe:2.3:a:apache:tomcat:6.0.8
  • Apache » Tomcat » Version: 6.0.9
    cpe:2.3:a:apache:tomcat:6.0.9


Contact Us

Shodan ® - All rights reserved