First published: Fri Mar 06 2009(Updated: )
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat5 | <0:5.5.23-0jpp.7.el5_3.2 | 0:5.5.23-0jpp.7.el5_3.2 |
Apache Tomcat | =4.1.0 | |
Apache Tomcat | =4.1.1 | |
Apache Tomcat | =4.1.2 | |
Apache Tomcat | =4.1.3 | |
Apache Tomcat | =4.1.3-beta | |
Apache Tomcat | =4.1.4 | |
Apache Tomcat | =4.1.5 | |
Apache Tomcat | =4.1.6 | |
Apache Tomcat | =4.1.7 | |
Apache Tomcat | =4.1.8 | |
Apache Tomcat | =4.1.9 | |
Apache Tomcat | =4.1.9-beta | |
Apache Tomcat | =4.1.10 | |
Apache Tomcat | =4.1.11 | |
Apache Tomcat | =4.1.12 | |
Apache Tomcat | =4.1.13 | |
Apache Tomcat | =4.1.14 | |
Apache Tomcat | =4.1.15 | |
Apache Tomcat | =4.1.16 | |
Apache Tomcat | =4.1.17 | |
Apache Tomcat | =4.1.18 | |
Apache Tomcat | =4.1.19 | |
Apache Tomcat | =4.1.20 | |
Apache Tomcat | =4.1.21 | |
Apache Tomcat | =4.1.22 | |
Apache Tomcat | =4.1.23 | |
Apache Tomcat | =4.1.24 | |
Apache Tomcat | =4.1.25 | |
Apache Tomcat | =4.1.26 | |
Apache Tomcat | =4.1.27 | |
Apache Tomcat | =4.1.28 | |
Apache Tomcat | =4.1.29 | |
Apache Tomcat | =4.1.30 | |
Apache Tomcat | =4.1.31 | |
Apache Tomcat | =4.1.32 | |
Apache Tomcat | =4.1.33 | |
Apache Tomcat | =4.1.34 | |
Apache Tomcat | =4.1.35 | |
Apache Tomcat | =4.1.36 | |
Apache Tomcat | =4.1.37 | |
Apache Tomcat | =5.5.0 | |
Apache Tomcat | =5.5.1 | |
Apache Tomcat | =5.5.2 | |
Apache Tomcat | =5.5.3 | |
Apache Tomcat | =5.5.4 | |
Apache Tomcat | =5.5.5 | |
Apache Tomcat | =5.5.6 | |
Apache Tomcat | =5.5.7 | |
Apache Tomcat | =5.5.8 | |
Apache Tomcat | =5.5.9 | |
Apache Tomcat | =5.5.10 | |
Apache Tomcat | =5.5.11 | |
Apache Tomcat | =5.5.12 | |
Apache Tomcat | =5.5.13 | |
Apache Tomcat | =5.5.14 | |
Apache Tomcat | =5.5.15 | |
Apache Tomcat | =5.5.16 | |
Apache Tomcat | =5.5.17 | |
Apache Tomcat | =5.5.18 | |
Apache Tomcat | =5.5.19 | |
Apache Tomcat | =5.5.20 | |
Apache Tomcat | =5.5.21 | |
Apache Tomcat | =5.5.22 | |
Apache Tomcat | =5.5.23 | |
Apache Tomcat | =5.5.24 | |
Apache Tomcat | =5.5.25 | |
Apache Tomcat | =5.5.26 | |
Apache Tomcat | =6.0 | |
Apache Tomcat | =6.0.0 | |
Apache Tomcat | =6.0.1 | |
Apache Tomcat | =6.0.2 | |
Apache Tomcat | =6.0.3 | |
Apache Tomcat | =6.0.4 | |
Apache Tomcat | =6.0.5 | |
Apache Tomcat | =6.0.6 | |
Apache Tomcat | =6.0.7 | |
Apache Tomcat | =6.0.8 | |
Apache Tomcat | =6.0.9 | |
Apache Tomcat | =6.0.10 | |
Apache Tomcat | =6.0.11 | |
Apache Tomcat | =6.0.12 | |
Apache Tomcat | =6.0.13 | |
Apache Tomcat | =6.0.14 | |
Apache Tomcat | =6.0.15 | |
Apache Tomcat | =6.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.