Guest

Preview Tool

Cisco Bug: CSCvv77032 - CIAM: tomcat 6.0.32 CVE-2016-0714 and others

Last Modified

Sep 29, 2020

Products (1)

  • Network Level Service

Known Affected Releases

5.0(0.0.109)

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1184 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1184
CVE-2011-2204 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2204
CVE-2011-2526 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526
CVE-2011-2729 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729
CVE-2011-3190 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190
CVE-2011-3375 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3375
CVE-2011-4858 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4858
CVE-2011-5062 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5062
CVE-2011-5063 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5063
CVE-2011-5064 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5064
CVE-2012-0022 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022
CVE-2012-2733 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2733
CVE-2012-3544 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544
CVE-2012-3546 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3546
CVE-2012-4431 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4431
CVE-2012-4534 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4534
CVE-2012-5568 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5568
CVE-2012-5885 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885
CVE-2012-5886 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886
CVE-2012-5887 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887
CVE-2013-2067 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2067
CVE-2013-4286 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
CVE-2013-4322 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
CVE-2013-4444 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
CVE-2013-4590 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
CVE-2014-0075 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
CVE-2014-0096 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
CVE-2014-0099 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
CVE-2014-0119 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
CVE-2014-0227 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
CVE-2014-0230 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230
CVE-2014-7810 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810
CVE-2015-5174 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174
CVE-2015-5345 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345
CVE-2016-0706 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706
CVE-2016-0714 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714
CVE-2016-0762 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762
CVE-2016-5018 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018
CVE-2016-5388 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388
CVE-2016-6794 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794
CVE-2016-6796 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796
CVE-2016-6797 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797
CVE-2016-6816 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816
CVE-2016-8735 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8735
CVE-2017-5647 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647
CVE-2020-8022 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8022

The affected third-party software component has been upgraded to a version that includes fixes for the vulnerability. Future versions of the product(s) will not be affected by this vulnerability.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.