CVE-2008-0002

N/A Unknown
Published: February 12, 2008 Modified: April 23, 2026
View on NVD

Description

Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/28834
Source: secalert@redhat.com
http://secunia.com/advisories/28915
Source: secalert@redhat.com
http://secunia.com/advisories/29711
Source: secalert@redhat.com
http://secunia.com/advisories/32222
Source: secalert@redhat.com
http://secunia.com/advisories/37460
Source: secalert@redhat.com
http://secunia.com/advisories/57126
Source: secalert@redhat.com
http://support.apple.com/kb/HT3216
Source: secalert@redhat.com
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
http://www.securityfocus.com/bid/27703
Source: secalert@redhat.com
http://www.securityfocus.com/bid/31681
Source: secalert@redhat.com
http://marc.info/?l=bugtraq&m=139344343412337&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/28834
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/28915
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29711
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32222
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37460
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/57126
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200804-10.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/3638
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3216
Source: af854a3a-2127-422b-91ae-364da2661108
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/487812/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/27703
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31681
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0488
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2780
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3316
Source: af854a3a-2127-422b-91ae-364da2661108

46 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.4%
89th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

apache