Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2007-5461

Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.036
EPSS Ranking 87.2%
CVSS Severity
CVSS v2 Score 3.5
References
Products affected by CVE-2007-5461
  • Apache » Tomcat » Version: 4.0.0
    cpe:2.3:a:apache:tomcat:4.0.0
  • Apache » Tomcat » Version: 4.0.1
    cpe:2.3:a:apache:tomcat:4.0.1
  • Apache » Tomcat » Version: 4.0.2
    cpe:2.3:a:apache:tomcat:4.0.2
  • Apache » Tomcat » Version: 4.0.3
    cpe:2.3:a:apache:tomcat:4.0.3
  • Apache » Tomcat » Version: 4.0.4
    cpe:2.3:a:apache:tomcat:4.0.4
  • Apache » Tomcat » Version: 4.0.5
    cpe:2.3:a:apache:tomcat:4.0.5
  • Apache » Tomcat » Version: 4.0.6
    cpe:2.3:a:apache:tomcat:4.0.6
  • Apache » Tomcat » Version: 4.1.0
    cpe:2.3:a:apache:tomcat:4.1.0
  • Apache » Tomcat » Version: 4.1.1
    cpe:2.3:a:apache:tomcat:4.1.1
  • Apache » Tomcat » Version: 4.1.10
    cpe:2.3:a:apache:tomcat:4.1.10
  • Apache » Tomcat » Version: 4.1.11
    cpe:2.3:a:apache:tomcat:4.1.11
  • Apache » Tomcat » Version: 4.1.12
    cpe:2.3:a:apache:tomcat:4.1.12
  • Apache » Tomcat » Version: 4.1.13
    cpe:2.3:a:apache:tomcat:4.1.13
  • Apache » Tomcat » Version: 4.1.14
    cpe:2.3:a:apache:tomcat:4.1.14
  • Apache » Tomcat » Version: 4.1.15
    cpe:2.3:a:apache:tomcat:4.1.15
  • Apache » Tomcat » Version: 4.1.16
    cpe:2.3:a:apache:tomcat:4.1.16
  • Apache » Tomcat » Version: 4.1.17
    cpe:2.3:a:apache:tomcat:4.1.17
  • Apache » Tomcat » Version: 4.1.18
    cpe:2.3:a:apache:tomcat:4.1.18
  • Apache » Tomcat » Version: 4.1.19
    cpe:2.3:a:apache:tomcat:4.1.19
  • Apache » Tomcat » Version: 4.1.2
    cpe:2.3:a:apache:tomcat:4.1.2
  • Apache » Tomcat » Version: 4.1.20
    cpe:2.3:a:apache:tomcat:4.1.20
  • Apache » Tomcat » Version: 4.1.21
    cpe:2.3:a:apache:tomcat:4.1.21
  • Apache » Tomcat » Version: 4.1.22
    cpe:2.3:a:apache:tomcat:4.1.22
  • Apache » Tomcat » Version: 4.1.23
    cpe:2.3:a:apache:tomcat:4.1.23
  • Apache » Tomcat » Version: 4.1.24
    cpe:2.3:a:apache:tomcat:4.1.24
  • Apache » Tomcat » Version: 4.1.25
    cpe:2.3:a:apache:tomcat:4.1.25
  • Apache » Tomcat » Version: 4.1.26
    cpe:2.3:a:apache:tomcat:4.1.26
  • Apache » Tomcat » Version: 4.1.27
    cpe:2.3:a:apache:tomcat:4.1.27
  • Apache » Tomcat » Version: 4.1.28
    cpe:2.3:a:apache:tomcat:4.1.28
  • Apache » Tomcat » Version: 4.1.29
    cpe:2.3:a:apache:tomcat:4.1.29
  • Apache » Tomcat » Version: 4.1.3
    cpe:2.3:a:apache:tomcat:4.1.3
  • Apache » Tomcat » Version: 4.1.30
    cpe:2.3:a:apache:tomcat:4.1.30
  • Apache » Tomcat » Version: 4.1.31
    cpe:2.3:a:apache:tomcat:4.1.31
  • Apache » Tomcat » Version: 4.1.32
    cpe:2.3:a:apache:tomcat:4.1.32
  • Apache » Tomcat » Version: 4.1.33
    cpe:2.3:a:apache:tomcat:4.1.33
  • Apache » Tomcat » Version: 4.1.34
    cpe:2.3:a:apache:tomcat:4.1.34
  • Apache » Tomcat » Version: 4.1.35
    cpe:2.3:a:apache:tomcat:4.1.35
  • Apache » Tomcat » Version: 4.1.36
    cpe:2.3:a:apache:tomcat:4.1.36
  • Apache » Tomcat » Version: 4.1.4
    cpe:2.3:a:apache:tomcat:4.1.4
  • Apache » Tomcat » Version: 4.1.5
    cpe:2.3:a:apache:tomcat:4.1.5
  • Apache » Tomcat » Version: 4.1.6
    cpe:2.3:a:apache:tomcat:4.1.6
  • Apache » Tomcat » Version: 4.1.7
    cpe:2.3:a:apache:tomcat:4.1.7
  • Apache » Tomcat » Version: 4.1.8
    cpe:2.3:a:apache:tomcat:4.1.8
  • Apache » Tomcat » Version: 4.1.9
    cpe:2.3:a:apache:tomcat:4.1.9


Contact Us

Shodan ® - All rights reserved