Modified: tomcat/site/trunk/docs/security-3.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-3.html?rev=1521594&r1=1521593&r2=1521594&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-3.html (original)
+++ tomcat/site/trunk/docs/security-3.html Tue Sep 10 19:21:22 2013
@@ -1,252 +1,8 @@
-<html>
-<head>
-<META http-equiv="Content-Type" content="text/html; charset=utf-8">
-<title>Apache Tomcat - Apache Tomcat 3.x vulnerabilities</title>
-<meta name="author" content="Apache Tomcat Project">
-<link type="text/css" href="stylesheets/tomcat.css" rel="stylesheet">
-<link type="text/css" href="stylesheets/tomcat-printer.css" rel="stylesheet" 
media="print">
-</head>
-<body bgcolor="#ffffff" text="#000000" link="#525D76" alink="#525D76" 
vlink="#525D76">
-<table border="0" width="100%" cellspacing="0">
-<!--PAGE HEADER-->
-<tr>
-<td>
-<!--PROJECT LOGO--><a href="http://tomcat.apache.org/";><img 
src="./images/tomcat.gif" align="left" alt="Tomcat Logo" 
border="0"></a></td><td><font face="arial,helvetica,sanserif">
-<h1>Apache Tomcat</h1>
-</font></td><td>
-<!--APACHE LOGO--><a href="http://www.apache.org/";><img 
src="http://www.apache.org/images/asf-logo.gif"; align="right" alt="Apache Logo" 
border="0"></a></td>
-</tr>
-</table>
-<div class="searchbox noPrint">
-<form action="http://www.google.com/search"; method="get">
-<input value="tomcat.apache.org" name="sitesearch" type="hidden"><input 
value="Search the Site" size="25" name="q" id="query" type="text"><input 
name="Search" value="Search Site" type="submit">
-</form>
-</div>
-<table border="0" width="100%" cellspacing="4">
-<!--HEADER SEPARATOR-->
-<tr>
-<td colspan="2">
-<hr noshade size="1">
-</td>
-</tr>
-<tr>
-<!--LEFT SIDE NAVIGATION-->
-<td width="20%" valign="top" nowrap="true" class="noPrint">
-<p>
-<strong>Apache Tomcat</strong>
-</p>
-<ul>
-<li>
-<a href="./index.html">Home</a>
-</li>
-<li>
-<a href="./taglibs/">Taglibs</a>
-</li>
-<li>
-<a href="./maven-plugin.html">Maven Plugin</a>
-</li>
-</ul>
-<p>
-<strong>Download</strong>
-</p>
-<ul>
-<li>
-<a href="./whichversion.html">Which version?</a>
-</li>
-<li>
-<a href="./download-80.cgi">Tomcat 8.0</a>
-</li>
-<li>
-<a href="./download-70.cgi">Tomcat 7.0</a>
-</li>
-<li>
-<a href="./download-60.cgi">Tomcat 6.0</a>
-</li>
-<li>
-<a href="./download-connectors.cgi">Tomcat Connectors</a>
-</li>
-<li>
-<a href="./download-native.cgi">Tomcat Native</a>
-</li>
-<li>
-<a href="http://archive.apache.org/dist/tomcat/";>Archives</a>
-</li>
-</ul>
-<p>
-<strong>Documentation</strong>
-</p>
-<ul>
-<li>
-<a href="./tomcat-8.0-doc/index.html">Tomcat 8.0</a>
-</li>
-<li>
-<a href="./tomcat-7.0-doc/index.html">Tomcat 7.0</a>
-</li>
-<li>
-<a href="./tomcat-6.0-doc/index.html">Tomcat 6.0</a>
-</li>
-<li>
-<a href="./connectors-doc/">Tomcat Connectors</a>
-</li>
-<li>
-<a href="./native-doc/">Tomcat Native</a>
-</li>
-<li>
-<a href="http://wiki.apache.org/tomcat/FrontPage";>Wiki</a>
-</li>
-<li>
-<a href="./migration.html">Migration Guide</a>
-</li>
-</ul>
-<p>
-<strong>Problems?</strong>
-</p>
-<ul>
-<li>
-<a href="./security.html">Security Reports</a>
-</li>
-<li>
-<a href="./findhelp.html">Find help</a>
-</li>
-<li>
-<a href="http://wiki.apache.org/tomcat/FAQ";>FAQ</a>
-</li>
-<li>
-<a href="./lists.html">Mailing Lists</a>
-</li>
-<li>
-<a href="./bugreport.html">Bug Database</a>
-</li>
-<li>
-<a href="./irc.html">IRC</a>
-</li>
-</ul>
-<p>
-<strong>Get Involved</strong>
-</p>
-<ul>
-<li>
-<a href="./getinvolved.html">Overview</a>
-</li>
-<li>
-<a href="./svn.html">SVN Repositories</a>
-</li>
-<li>
-<a href="./ci.html">Buildbot</a>
-</li>
-<li>
-<a href="https://reviews.apache.org/groups/tomcat/";>Reviewboard</a>
-</li>
-<li>
-<a href="./tools.html">Tools</a>
-</li>
-</ul>
-<p>
-<strong>Media</strong>
-</p>
-<ul>
-<li>
-<a href="http://blogs.apache.org/tomcat/";>Blog</a>
-</li>
-<li>
-<a href="http://twitter.com/theapachetomcat";>Twitter</a>
-</li>
-</ul>
-<p>
-<strong>Misc</strong>
-</p>
-<ul>
-<li>
-<a href="./whoweare.html">Who We Are</a>
-</li>
-<li>
-<a href="./heritage.html">Heritage</a>
-</li>
-<li>
-<a href="http://www.apache.org";>Apache Home</a>
-</li>
-<li>
-<a href="./resources.html">Resources</a>
-</li>
-<li>
-<a href="./contact.html">Contact</a>
-</li>
-<li>
-<a href="./legal.html">Legal</a>
-</li>
-<li>
-<a href="http://www.apache.org/foundation/sponsorship.html";>Sponsorship</a>
-</li>
-<li>
-<a href="http://www.apache.org/foundation/thanks.html";>Thanks</a>
-</li>
-</ul>
-</td>
-<!--RIGHT SIDE MAIN BODY--><td width="80%" valign="top" align="left" 
id="mainBody">
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Table of Contents">
-<!--()--></a><a name="Table_of_Contents"><strong>Table of 
Contents</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-
-<ul>
-<li>
-<a href="#Apache_Tomcat_3.x_vulnerabilities">Apache Tomcat 3.x 
vulnerabilities</a>
-</li>
-<li>
-<a href="#Not_fixed_in_Apache_Tomcat_3.x">Not fixed in Apache Tomcat 3.x</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_3.3.2">Fixed in Apache Tomcat 3.3.2</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_3.3.1a">Fixed in Apache Tomcat 3.3.1a</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_3.3.1">Fixed in Apache Tomcat 3.3.1</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_3.3a">Fixed in Apache Tomcat 3.3a</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_3.2.4">Fixed in Apache Tomcat 3.2.4</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_3.2.2">Fixed in Apache Tomcat 3.2.2</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_3.2">Fixed in Apache Tomcat 3.2</a>
-</li>
-<li>
-<a href="#Fixed_in_Apache_Tomcat_3.1">Fixed in Apache Tomcat 3.1</a>
-</li>
-</ul>
-
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Apache Tomcat 3.x vulnerabilities">
-<!--()--></a><a name="Apache_Tomcat_3.x_vulnerabilities"><strong>Apache Tomcat 
3.x vulnerabilities</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>This page lists all security vulnerabilities fixed in released versions
+<!DOCTYPE html SYSTEM "about:legacy-compat">
+<html lang="en"><head><META http-equiv="Content-Type" content="text/html; 
charset=UTF-8"><link href="stylesheets/tomcat.css" rel="stylesheet" 
type="text/css"><link href="stylesheets/tomcat-printer.css" rel="stylesheet" 
type="text/css" media="print"><title>Apache Tomcat - Apache Tomcat 3.x 
vulnerabilities</title><meta name="author" content="Apache Tomcat 
Project"></head><body><div id="wrapper"><header id="header"><div><div><div 
class="logo noPrint"><a href=""><img alt="Tomcat Home" 
src="./images/tomcat.png"></a></div><div style="height: 1px;"></div><div 
class="asfLogo"><a href="http://www.apache.org/"; target="_blank"><img 
src="http://www.apache.org/images/feather.png"; alt="The Apache Software 
Foundation" style="width: 266px; height: 83px;"></a></div><h1 
style="margin-top: 35px;">Apache Tomcat</h1><div style="clear: 
right;"></div><div class="searchbox noPrint"><form 
action="http://www.google.com/search"; method="get"><input 
value="tomcat.apache.org" name="sitesearch" type="hidden"><inp
 ut placeholder="Search the Site&hellip;" required="required" size="25" 
name="q" id="query" type="search"><button>Search</button></form></div><div 
style="height: 1px;"></div><div style="clear: 
left;"></div></div></div></header><div id="middle"><div><div id="mainLeft" 
class="noprint"><div><nav><div><h2><strong>Apache 
Tomcat</strong></h2><ul><li><a href="./index.html">Home</a></li><li><a 
href="./taglibs/">Taglibs</a></li><li><a href="./maven-plugin.html">Maven 
Plugin</a></li></ul></div><div><h2><strong>Download</strong></h2><ul><li><a 
href="./whichversion.html">Which version?</a></li><li><a 
href="./download-80.cgi">Tomcat 8.0</a></li><li><a 
href="./download-70.cgi">Tomcat 7.0</a></li><li><a 
href="./download-60.cgi">Tomcat 6.0</a></li><li><a 
href="./download-connectors.cgi">Tomcat Connectors</a></li><li><a 
href="./download-native.cgi">Tomcat Native</a></li><li><a 
href="http://archive.apache.org/dist/tomcat/";>Archives</a></li></ul></div><div><h2><strong>Documentation</strong></h2><ul><li
 ><a href="./tomcat-8.0-doc/index.html">Tomcat 8.0</a></li><li><a 
 >href="./tomcat-7.0-doc/index.html">Tomcat 7.0</a></li><li><a 
 >href="./tomcat-6.0-doc/index.html">Tomcat 6.0</a></li><li><a 
 >href="./connectors-doc/">Tomcat Connectors</a></li><li><a 
 >href="./native-doc/">Tomcat Native</a></li><li><a 
 >href="http://wiki.apache.org/tomcat/FrontPage";>Wiki</a></li><li><a 
 >href="./migration.html">Migration 
 >Guide</a></li></ul></div><div><h2><strong>Problems?</strong></h2><ul><li><a 
 >href="./security.html">Security Reports</a></li><li><a 
 >href="./findhelp.html">Find help</a></li><li><a 
 >href="http://wiki.apache.org/tomcat/FAQ";>FAQ</a></li><li><a 
 >href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug 
 >Database</a></li><li><a 
 >href="./irc.html">IRC</a></li></ul></div><div><h2><strong>Get 
 >Involved</strong></h2><ul><li><a 
 >href="./getinvolved.html">Overview</a></li><li><a href="./svn.html">SVN 
 >Repositories</a></li><li><a href="./ci.html">Buildbot</a></li><li><a 
 >href="https://reviews.apa
 che.org/groups/tomcat/">Reviewboard</a></li><li><a 
href="./tools.html">Tools</a></li></ul></div><div><h2><strong>Media</strong></h2><ul><li><a
 href="http://blogs.apache.org/tomcat/";>Blog</a></li><li><a 
href="http://twitter.com/theapachetomcat";>Twitter</a></li></ul></div><div><h2><strong>Misc</strong></h2><ul><li><a
 href="./whoweare.html">Who We Are</a></li><li><a 
href="./heritage.html">Heritage</a></li><li><a 
href="http://www.apache.org";>Apache Home</a></li><li><a 
href="./resources.html">Resources</a></li><li><a 
href="./contact.html">Contact</a></li><li><a 
href="./legal.html">Legal</a></li><li><a 
href="http://www.apache.org/foundation/sponsorship.html";>Sponsorship</a></li><li><a
 
href="http://www.apache.org/foundation/thanks.html";>Thanks</a></li></ul></div></nav></div></div><div
 id="mainRight"><div id="content"><main><h2 style="display: 
none;">Content</h2><h3 id="Table_of_Contents">Table of Contents</h3><div 
class="text">
+<ul><li><a href="#Apache_Tomcat_3.x_vulnerabilities">Apache Tomcat 3.x 
vulnerabilities</a></li><li><a href="#Not_fixed_in_Apache_Tomcat_3.x">Not fixed 
in Apache Tomcat 3.x</a></li><li><a href="#Fixed_in_Apache_Tomcat_3.3.2">Fixed 
in Apache Tomcat 3.3.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_3.3.1a">Fixed in Apache Tomcat 
3.3.1a</a></li><li><a href="#Fixed_in_Apache_Tomcat_3.3.1">Fixed in Apache 
Tomcat 3.3.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_3.3a">Fixed in Apache 
Tomcat 3.3a</a></li><li><a href="#Fixed_in_Apache_Tomcat_3.2.4">Fixed in Apache 
Tomcat 3.2.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_3.2.2">Fixed in 
Apache Tomcat 3.2.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_3.2">Fixed in 
Apache Tomcat 3.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_3.1">Fixed in 
Apache Tomcat 3.1</a></li></ul>
+</div><h3 id="Apache_Tomcat_3.x_vulnerabilities">Apache Tomcat 3.x 
vulnerabilities</h3><div class="text">
+    <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat 3.x. Each vulnerability is given a
        <a href="security-impact.html">security impact rating</a> by the Apache
        Tomcat security team &mdash; please note that this rating may vary from
@@ -254,445 +10,162 @@
        is known to affect, and where a flaw has not been verified list the
        version with a question mark.</p>
 
-    
-<p>Please note that Tomcat 3 is no longer supported. Further vulnerabilities
+    <p>Please note that Tomcat 3 is no longer supported. Further 
vulnerabilities
        in the 3.x branches will not be fixed. Users should upgrade to
        6.x or 7.x to obtain security fixes.</p>
 
-    
-<p>Please send comments or corrections for these vulnerabilities to the
+    <p>Please send comments or corrections for these vulnerabilities to the
        <a href="security.html">Tomcat Security Team</a>.</p>
 
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Not fixed in Apache Tomcat 3.x">
-<!--()--></a><a name="Not_fixed_in_Apache_Tomcat_3.x"><strong>Not fixed in 
Apache Tomcat 3.x</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Important: Denial of service</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0808"; 
rel="nofollow">CVE-2005-0808</a>
-</p>
+  </div><h3 id="Not_fixed_in_Apache_Tomcat_3.x">Not fixed in Apache Tomcat 
3.x</h3><div class="text">
+    <p><strong>Important: Denial of service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0808"; 
rel="nofollow">CVE-2005-0808</a></p>
 
-    
-<p>Tomcat 3.x can be remotely caused to crash or shutdown by a connection
+    <p>Tomcat 3.x can be remotely caused to crash or shutdown by a connection
        sending the right sequence of bytes to the AJP12 protocol port (TCP 8007
        by default). Tomcat 3.x users are advised to ensure that this port is
        adequately firewalled to ensure it is not accessible to remote 
attackers.
        There are no plans to issue a an update to Tomcat 3.x for this 
issue.</p>
 
-    
-<p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.2</p>
+    <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.2</p>
 
-    
-<p>
-<strong>Low: Session hi-jacking</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382"; 
rel="nofollow">CVE-2007-3382</a>
-</p>
+    <p><strong>Low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382"; 
rel="nofollow">CVE-2007-3382</a></p>
 
-    
-<p>Tomcat incorrectly treated a single quote character (') in a cookie
+    <p>Tomcat incorrectly treated a single quote character (') in a cookie
        value as a delimiter. In some circumstances this lead to the leaking of
        information such as session ID to an attacker.</p>
 
-    
-<p>Affects: 3.3-3.3.2</p>
+    <p>Affects: 3.3-3.3.2</p>
 
-    
-<p>
-<strong>Low: Cross site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3384"; 
rel="nofollow">CVE-2007-3384</a>
-</p>
+    <p><strong>Low: Cross site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3384"; 
rel="nofollow">CVE-2007-3384</a></p>
 
-    
-<p>When reporting error messages, Tomcat does not filter user supplied data
+    <p>When reporting error messages, Tomcat does not filter user supplied data
        before display. This enables an XSS attack. A source patch is available
        from the <a 
href="http://archive.apache.org/dist/tomcat/tomcat-3/v3.3.2-patches/src/";>
        archives</a>.</p>
 
-    
-<p>Affects: 3.3-3.3.2</p>
+    <p>Affects: 3.3-3.3.2</p>
 
-    
-<p>
-<strong>Low: Session hi-jacking</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385"; 
rel="nofollow">CVE-2007-3385</a>
-</p>
+    <p><strong>Low: Session hi-jacking</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385"; 
rel="nofollow">CVE-2007-3385</a></p>
 
-    
-<p>Tomcat incorrectly handled the character sequence \" in a cookie value.
+    <p>Tomcat incorrectly handled the character sequence \" in a cookie value.
        In some circumstances this lead to the leaking of information such as
        session ID to an attacker.</p>
 
-    
-<p>Affects: 3.3-3.3.2</p>
+    <p>Affects: 3.3-3.3.2</p>
 
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Fixed in Apache Tomcat 3.3.2">
-<!--()--></a><a name="Fixed_in_Apache_Tomcat_3.3.2"><strong>Fixed in Apache 
Tomcat 3.3.2</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Moderate: Cross site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0044"; 
rel="nofollow">CVE-2003-0044</a>
-</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_3.3.2">Fixed in Apache Tomcat 
3.3.2</h3><div class="text">
+    <p><strong>Moderate: Cross site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0044"; 
rel="nofollow">CVE-2003-0044</a></p>
 
-    
-<p>The root web application and the examples web application contained a
+    <p>The root web application and the examples web application contained a
        number a cross-site scripting vulnerabilities. Note that is it
        recommended that the examples web application is not installed on
        production servers.</p>
 
-    
-<p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.1a</p>
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Fixed in Apache Tomcat 3.3.1a">
-<!--()--></a><a name="Fixed_in_Apache_Tomcat_3.3.1a"><strong>Fixed in Apache 
Tomcat 3.3.1a</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0043"; 
rel="nofollow">CVE-2003-0043</a>
-</p>
+    <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.1a</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_3.3.1a">Fixed in Apache Tomcat 
3.3.1a</h3><div class="text">
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0043"; 
rel="nofollow">CVE-2003-0043</a></p>
 
-    
-<p>When used with JDK 1.3.1 or earlier, web.xml files were read with
+    <p>When used with JDK 1.3.1 or earlier, web.xml files were read with
        trusted privileges enabling files outside of the web application to be
        read even when running under a security manager.</p>
 
-    
-<p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.1</p>
+    <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.1</p>
 
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0042"; 
rel="nofollow">CVE-2003-0042</a>
-</p>
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0042"; 
rel="nofollow">CVE-2003-0042</a></p>
 
-    
-<p>URLs containing null characters could result in file contents being
+    <p>URLs containing null characters could result in file contents being
        returned or a directory listing being returned even when a welcome file
        was defined.</p>
 
-    
-<p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.1</p>
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Fixed in Apache Tomcat 3.3.1">
-<!--()--></a><a name="Fixed_in_Apache_Tomcat_3.3.1"><strong>Fixed in Apache 
Tomcat 3.3.1</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Important: Denial of service</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0045"; 
rel="nofollow">CVE-2003-0045</a>
-</p>
+    <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a-3.3.1</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_3.3.1">Fixed in Apache Tomcat 
3.3.1</h3><div class="text">
+    <p><strong>Important: Denial of service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0045"; 
rel="nofollow">CVE-2003-0045</a></p>
 
-    
-<p>JSP page names that match a Windows DOS device name, such as aux.jsp, may
+    <p>JSP page names that match a Windows DOS device name, such as aux.jsp, 
may
        cause the thread processing the request to become unresponsive. A
        sequence of such requests may cause all request processing threads, and
        hence Tomcat, to become unresponsive.</p>
 
-    
-<p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a</p>
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Fixed in Apache Tomcat 3.3a">
-<!--()--></a><a name="Fixed_in_Apache_Tomcat_3.3a"><strong>Fixed in Apache 
Tomcat 3.3a</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Moderate: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2007"; 
rel="nofollow">CVE-2002-2007</a>
-</p>
+    <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.4, 3.3a</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_3.3a">Fixed in Apache Tomcat 
3.3a</h3><div class="text">
+    <p><strong>Moderate: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2007"; 
rel="nofollow">CVE-2002-2007</a></p>
 
-    
-<p>Non-standard requests to the sample applications installed by default
+    <p>Non-standard requests to the sample applications installed by default
        could result in unexpected directory listings or disclosure of the full
        file system path for a JSP.</p>
 
-    
-<p>Affects: 3.2.3-3.2.4</p>
+    <p>Affects: 3.2.3-3.2.4</p>
 
-    
-<p>
-<strong>Low: Information disclosure</strong>
+    <p><strong>Low: Information disclosure</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2006"; 
rel="nofollow">CVE-2002-2006</a>,
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0760"; 
rel="nofollow">CVE-2000-0760</a>
-</p>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0760"; 
rel="nofollow">CVE-2000-0760</a></p>
 
-    
-<p>The snoop servlet installed as part of the examples includes output that
+    <p>The snoop servlet installed as part of the examples includes output that
        identifies the Tomcat installation path. There are no plans to issue a 
an
        update to Tomcat 3.x for this issue.</p>
 
-    
-<p>Affects:3.1-3.1.1, 3.2-3.2.4</p>
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Fixed in Apache Tomcat 3.2.4">
-<!--()--></a><a name="Fixed_in_Apache_Tomcat_3.2.4"><strong>Fixed in Apache 
Tomcat 3.2.4</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Moderate: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1563"; 
rel="nofollow">CVE-2001-1563</a>
-<br>
-</p>
+    <p>Affects:3.1-3.1.1, 3.2-3.2.4</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_3.2.4">Fixed in Apache Tomcat 
3.2.4</h3><div class="text">
+    <p><strong>Moderate: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1563"; 
rel="nofollow">CVE-2001-1563</a><br></p>
 
-    
-<p>No specifics are provided in the vulnerability report. This may be a
+    <p>No specifics are provided in the vulnerability report. This may be a
        summary of other issues reported against 3.2.x</p>
 
-    
-<p>Affects: 3.2?, 3.2.1, 3.2.2-3.2.3?</p>
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Fixed in Apache Tomcat 3.2.2">
-<!--()--></a><a name="Fixed_in_Apache_Tomcat_3.2.2"><strong>Fixed in Apache 
Tomcat 3.2.2</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Moderate: Cross site scripting</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0829"; 
rel="nofollow">CVE-2001-0829</a>
-</p>
+    <p>Affects: 3.2?, 3.2.1, 3.2.2-3.2.3?</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_3.2.2">Fixed in Apache Tomcat 
3.2.2</h3><div class="text">
+    <p><strong>Moderate: Cross site scripting</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0829"; 
rel="nofollow">CVE-2001-0829</a></p>
 
-    
-<p>The default 404 error page does not escape URLs. This allows XSS
+    <p>The default 404 error page does not escape URLs. This allows XSS
        attacks using specially crafted URLs.</p>
 
-    
-<p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.1</p>
+    <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.1</p>
 
-    
-<p>
-<strong>Moderate: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0590"; 
rel="nofollow">CVE-2001-0590</a>
-</p>
-
-    
-<p>A specially crafted URL can be used to obtain the source for JSPs.</p>
-
-    
-<p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.1</p>
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Fixed in Apache Tomcat 3.2">
-<!--()--></a><a name="Fixed_in_Apache_Tomcat_3.2"><strong>Fixed in Apache 
Tomcat 3.2</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Low: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0759"; 
rel="nofollow">CVE-2000-0759</a>
-</p>
+    <p><strong>Moderate: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0590"; 
rel="nofollow">CVE-2001-0590</a></p>
 
-    
-<p>Requesting a JSP that does not exist results in an error page that
+    <p>A specially crafted URL can be used to obtain the source for JSPs.</p>
+
+    <p>Affects: 3.0, 3.1-3.1.1, 3.2-3.2.1</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_3.2">Fixed in Apache Tomcat 
3.2</h3><div class="text">
+    <p><strong>Low: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0759"; 
rel="nofollow">CVE-2000-0759</a></p>
+
+    <p>Requesting a JSP that does not exist results in an error page that
        includes the full file system page of the current context.</p>
 
-    
-<p>Affects: 3.1</p>
+    <p>Affects: 3.1</p>
 
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0672"; 
rel="nofollow">CVE-2000-0672</a>
-</p>
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0672"; 
rel="nofollow">CVE-2000-0672</a></p>
 
-    
-<p>Access to the admin context is not protected. This context allows an
+    <p>Access to the admin context is not protected. This context allows an
        attacker to mount an arbitary file system path as a context. Any files
        accessible from this file sytem path to the account under which Tomcat
        is running are then visible to the attacker.</p>
 
-    
-<p>Affects: 3.1</p>
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-<table border="0" cellspacing="0" cellpadding="2" width="100%">
-<tr>
-<td bgcolor="#525D76"><font color="#ffffff" face="arial,helvetica,sanserif"><a 
name="Fixed in Apache Tomcat 3.1">
-<!--()--></a><a name="Fixed_in_Apache_Tomcat_3.1"><strong>Fixed in Apache 
Tomcat 3.1</strong></a></font></td>
-</tr>
-<tr>
-<td>
-<p>
-<blockquote>
-    
-<p>
-<strong>Important: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1210"; 
rel="nofollow">CVE-2000-1210</a>
-</p>
+    <p>Affects: 3.1</p>
+  </div><h3 id="Fixed_in_Apache_Tomcat_3.1">Fixed in Apache Tomcat 
3.1</h3><div class="text">
+    <p><strong>Important: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1210"; 
rel="nofollow">CVE-2000-1210</a></p>
 
-    
-<p>source.jsp, provided as part of the examples, allows an attacker to read
+    <p>source.jsp, provided as part of the examples, allows an attacker to read
        arbitrary files via a .. (dot dot) in the argument to source.jsp.</p>
 
-    
-<p>Affects: 3.0</p>
-  
-</blockquote>
-</p>
-</td>
-</tr>
-<tr>
-<td>
-<br>
-</td>
-</tr>
-</table>
-</td>
-</tr>
-<!--FOOTER SEPARATOR-->
-<tr>
-<td colspan="2">
-<hr noshade size="1">
-</td>
-</tr>
-<!--PAGE FOOTER-->
-<tr>
-<td colspan="2">
-<div align="center">
-<font color="#525D76" size="-1"><em>
-        Copyright &copy; 1999-2013, The Apache Software Foundation
-        <br>
-        Apache Tomcat, Tomcat, Apache, the Apache feather, and the Apache 
Tomcat
-        project logo are trademarks of the Apache Software Foundation.
-        </em></font>
-</div>
-</td>
-</tr>
-</table>
-</body>
-</html>
+    <p>Affects: 3.0</p>
+  </div></main></div></div></div></div><footer id="footer">
+    Copyright &copy; 1999-2013, The Apache Software Foundation
+    <br>
+    Apache Tomcat, Tomcat, Apache, the Apache feather, and the Apache Tomcat
+    project logo are trademarks of the Apache Software Foundation.
+  </footer></div></body></html>
\ No newline at end of file



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to