Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2008-1947

Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.491
EPSS Ranking 97.7%
CVSS Severity
CVSS v2 Score 4.3
References
Products affected by CVE-2008-1947
  • Apache » Tomcat » Version: 5.5.10
    cpe:2.3:a:apache:tomcat:5.5.10
  • Apache » Tomcat » Version: 5.5.11
    cpe:2.3:a:apache:tomcat:5.5.11
  • Apache » Tomcat » Version: 5.5.12
    cpe:2.3:a:apache:tomcat:5.5.12
  • Apache » Tomcat » Version: 5.5.13
    cpe:2.3:a:apache:tomcat:5.5.13
  • Apache » Tomcat » Version: 5.5.14
    cpe:2.3:a:apache:tomcat:5.5.14
  • Apache » Tomcat » Version: 5.5.15
    cpe:2.3:a:apache:tomcat:5.5.15
  • Apache » Tomcat » Version: 5.5.16
    cpe:2.3:a:apache:tomcat:5.5.16
  • Apache » Tomcat » Version: 5.5.17
    cpe:2.3:a:apache:tomcat:5.5.17
  • Apache » Tomcat » Version: 5.5.18
    cpe:2.3:a:apache:tomcat:5.5.18
  • Apache » Tomcat » Version: 5.5.19
    cpe:2.3:a:apache:tomcat:5.5.19
  • Apache » Tomcat » Version: 5.5.20
    cpe:2.3:a:apache:tomcat:5.5.20
  • Apache » Tomcat » Version: 5.5.21
    cpe:2.3:a:apache:tomcat:5.5.21
  • Apache » Tomcat » Version: 5.5.22
    cpe:2.3:a:apache:tomcat:5.5.22
  • Apache » Tomcat » Version: 5.5.23
    cpe:2.3:a:apache:tomcat:5.5.23
  • Apache » Tomcat » Version: 5.5.24
    cpe:2.3:a:apache:tomcat:5.5.24
  • Apache » Tomcat » Version: 5.5.25
    cpe:2.3:a:apache:tomcat:5.5.25
  • Apache » Tomcat » Version: 5.5.26
    cpe:2.3:a:apache:tomcat:5.5.26
  • Apache » Tomcat » Version: 5.5.9
    cpe:2.3:a:apache:tomcat:5.5.9
  • Apache » Tomcat » Version: 6.0.0
    cpe:2.3:a:apache:tomcat:6.0.0
  • Apache » Tomcat » Version: 6.0.1
    cpe:2.3:a:apache:tomcat:6.0.1
  • Apache » Tomcat » Version: 6.0.10
    cpe:2.3:a:apache:tomcat:6.0.10
  • Apache » Tomcat » Version: 6.0.11
    cpe:2.3:a:apache:tomcat:6.0.11
  • Apache » Tomcat » Version: 6.0.12
    cpe:2.3:a:apache:tomcat:6.0.12
  • Apache » Tomcat » Version: 6.0.13
    cpe:2.3:a:apache:tomcat:6.0.13
  • Apache » Tomcat » Version: 6.0.14
    cpe:2.3:a:apache:tomcat:6.0.14
  • Apache » Tomcat » Version: 6.0.15
    cpe:2.3:a:apache:tomcat:6.0.15
  • Apache » Tomcat » Version: 6.0.16
    cpe:2.3:a:apache:tomcat:6.0.16
  • Apache » Tomcat » Version: 6.0.2
    cpe:2.3:a:apache:tomcat:6.0.2
  • Apache » Tomcat » Version: 6.0.3
    cpe:2.3:a:apache:tomcat:6.0.3
  • Apache » Tomcat » Version: 6.0.4
    cpe:2.3:a:apache:tomcat:6.0.4
  • Apache » Tomcat » Version: 6.0.5
    cpe:2.3:a:apache:tomcat:6.0.5
  • Apache » Tomcat » Version: 6.0.6
    cpe:2.3:a:apache:tomcat:6.0.6
  • Apache » Tomcat » Version: 6.0.7
    cpe:2.3:a:apache:tomcat:6.0.7
  • Apache » Tomcat » Version: 6.0.8
    cpe:2.3:a:apache:tomcat:6.0.8
  • Apache » Tomcat » Version: 6.0.9
    cpe:2.3:a:apache:tomcat:6.0.9


Contact Us

Shodan ® - All rights reserved