Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2009-2696

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.01
EPSS Ranking 75.9%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2009-2696
  • Apache » Tomcat » Version: N/A
    cpe:2.3:a:apache:tomcat:-
  • Apache » Tomcat » Version: 1.1.3
    cpe:2.3:a:apache:tomcat:1.1.3
  • Apache » Tomcat » Version: 3.0
    cpe:2.3:a:apache:tomcat:3.0
  • Apache » Tomcat » Version: 3.1
    cpe:2.3:a:apache:tomcat:3.1
  • Apache » Tomcat » Version: 3.1.1
    cpe:2.3:a:apache:tomcat:3.1.1
  • Apache » Tomcat » Version: 3.2
    cpe:2.3:a:apache:tomcat:3.2
  • Apache » Tomcat » Version: 3.2.1
    cpe:2.3:a:apache:tomcat:3.2.1
  • Apache » Tomcat » Version: 3.2.2
    cpe:2.3:a:apache:tomcat:3.2.2
  • Apache » Tomcat » Version: 3.2.3
    cpe:2.3:a:apache:tomcat:3.2.3
  • Apache » Tomcat » Version: 3.2.4
    cpe:2.3:a:apache:tomcat:3.2.4
  • Apache » Tomcat » Version: 3.3
    cpe:2.3:a:apache:tomcat:3.3
  • Apache » Tomcat » Version: 3.3.1
    cpe:2.3:a:apache:tomcat:3.3.1
  • Apache » Tomcat » Version: 3.3.1a
    cpe:2.3:a:apache:tomcat:3.3.1a
  • Apache » Tomcat » Version: 3.3.2
    cpe:2.3:a:apache:tomcat:3.3.2
  • Apache » Tomcat » Version: 4
    cpe:2.3:a:apache:tomcat:4
  • Apache » Tomcat » Version: 4.0.0
    cpe:2.3:a:apache:tomcat:4.0.0
  • Apache » Tomcat » Version: 4.0.1
    cpe:2.3:a:apache:tomcat:4.0.1
  • Apache » Tomcat » Version: 4.0.2
    cpe:2.3:a:apache:tomcat:4.0.2
  • Apache » Tomcat » Version: 4.0.3
    cpe:2.3:a:apache:tomcat:4.0.3
  • Apache » Tomcat » Version: 4.0.4
    cpe:2.3:a:apache:tomcat:4.0.4
  • Apache » Tomcat » Version: 4.0.5
    cpe:2.3:a:apache:tomcat:4.0.5
  • Apache » Tomcat » Version: 4.0.6
    cpe:2.3:a:apache:tomcat:4.0.6
  • Apache » Tomcat » Version: 4.1.0
    cpe:2.3:a:apache:tomcat:4.1.0
  • Apache » Tomcat » Version: 4.1.1
    cpe:2.3:a:apache:tomcat:4.1.1
  • Apache » Tomcat » Version: 4.1.10
    cpe:2.3:a:apache:tomcat:4.1.10
  • Apache » Tomcat » Version: 4.1.11
    cpe:2.3:a:apache:tomcat:4.1.11
  • Apache » Tomcat » Version: 4.1.12
    cpe:2.3:a:apache:tomcat:4.1.12
  • Apache » Tomcat » Version: 4.1.13
    cpe:2.3:a:apache:tomcat:4.1.13
  • Apache » Tomcat » Version: 4.1.14
    cpe:2.3:a:apache:tomcat:4.1.14
  • Apache » Tomcat » Version: 4.1.15
    cpe:2.3:a:apache:tomcat:4.1.15
  • Apache » Tomcat » Version: 4.1.16
    cpe:2.3:a:apache:tomcat:4.1.16
  • Apache » Tomcat » Version: 4.1.17
    cpe:2.3:a:apache:tomcat:4.1.17
  • Apache » Tomcat » Version: 4.1.18
    cpe:2.3:a:apache:tomcat:4.1.18
  • Apache » Tomcat » Version: 4.1.19
    cpe:2.3:a:apache:tomcat:4.1.19
  • Apache » Tomcat » Version: 4.1.2
    cpe:2.3:a:apache:tomcat:4.1.2
  • Apache » Tomcat » Version: 4.1.20
    cpe:2.3:a:apache:tomcat:4.1.20
  • Apache » Tomcat » Version: 4.1.21
    cpe:2.3:a:apache:tomcat:4.1.21
  • Apache » Tomcat » Version: 4.1.22
    cpe:2.3:a:apache:tomcat:4.1.22
  • Apache » Tomcat » Version: 4.1.23
    cpe:2.3:a:apache:tomcat:4.1.23
  • Apache » Tomcat » Version: 4.1.24
    cpe:2.3:a:apache:tomcat:4.1.24
  • Apache » Tomcat » Version: 4.1.25
    cpe:2.3:a:apache:tomcat:4.1.25
  • Apache » Tomcat » Version: 4.1.26
    cpe:2.3:a:apache:tomcat:4.1.26
  • Apache » Tomcat » Version: 4.1.27
    cpe:2.3:a:apache:tomcat:4.1.27
  • Apache » Tomcat » Version: 4.1.28
    cpe:2.3:a:apache:tomcat:4.1.28
  • Apache » Tomcat » Version: 4.1.29
    cpe:2.3:a:apache:tomcat:4.1.29
  • Apache » Tomcat » Version: 4.1.3
    cpe:2.3:a:apache:tomcat:4.1.3
  • Apache » Tomcat » Version: 4.1.30
    cpe:2.3:a:apache:tomcat:4.1.30
  • Apache » Tomcat » Version: 4.1.31
    cpe:2.3:a:apache:tomcat:4.1.31
  • Apache » Tomcat » Version: 4.1.32
    cpe:2.3:a:apache:tomcat:4.1.32
  • Apache » Tomcat » Version: 4.1.33
    cpe:2.3:a:apache:tomcat:4.1.33
  • Apache » Tomcat » Version: 4.1.35
    cpe:2.3:a:apache:tomcat:4.1.35
  • Apache » Tomcat » Version: 4.1.36
    cpe:2.3:a:apache:tomcat:4.1.36
  • Apache » Tomcat » Version: 4.1.37
    cpe:2.3:a:apache:tomcat:4.1.37
  • Apache » Tomcat » Version: 4.1.38
    cpe:2.3:a:apache:tomcat:4.1.38
  • Apache » Tomcat » Version: 4.1.39
    cpe:2.3:a:apache:tomcat:4.1.39
  • Apache » Tomcat » Version: 4.1.4
    cpe:2.3:a:apache:tomcat:4.1.4
  • Apache » Tomcat » Version: 4.1.5
    cpe:2.3:a:apache:tomcat:4.1.5
  • Apache » Tomcat » Version: 4.1.6
    cpe:2.3:a:apache:tomcat:4.1.6
  • Apache » Tomcat » Version: 4.1.8
    cpe:2.3:a:apache:tomcat:4.1.8
  • Apache » Tomcat » Version: 4.1.9
    cpe:2.3:a:apache:tomcat:4.1.9
  • Redhat » Desktop Workstation » Version: 5
    cpe:2.3:o:redhat:desktop_workstation:5
  • Redhat » Enterprise Linux » Version: 5
    cpe:2.3:o:redhat:enterprise_linux:5
  • Redhat » Enterprise Linux Desktop » Version: 5.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:5.0


Contact Us

Shodan ® - All rights reserved