U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2012-5887

Change History

Modified Analysis by NIST 10/30/2025 11:49:33 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
          *cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*
OR
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 5.5.0 up to (excluding) 5.5.36
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.36
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.30
Removed CPE Configuration
OR
          *cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*

								
						
Removed CPE Configuration
OR
          *cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*

								
						
Added Reference Type

								
							
							
						
CVE: http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0623.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0629.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0631.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0632.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0633.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0640.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0647.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0648.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://rhn.redhat.com/errata/RHSA-2013-0726.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://secunia.com/advisories/51371 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: http://svn.apache.org/viewvc?view=revision&revision=1377807 Types: Permissions Required
Added Reference Type

								
							
							
						
CVE: http://svn.apache.org/viewvc?view=revision&revision=1380829 Types: Permissions Required
Added Reference Type

								
							
							
						
CVE: http://svn.apache.org/viewvc?view=revision&revision=1392248 Types: Permissions Required
Added Reference Type

								
							
							
						
CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21626891 Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://www.securityfocus.com/bid/56403 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: http://www.ubuntu.com/usn/USN-1637-1 Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 Types: Third Party Advisory, VDB Entry
Added Reference Type

								
							
							
						
MITRE: http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0623.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0629.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0631.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0632.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0633.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0640.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0647.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0648.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://rhn.redhat.com/errata/RHSA-2013-0726.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://secunia.com/advisories/51371 Types: Broken Link
Added Reference Type

								
							
							
						
MITRE: http://svn.apache.org/viewvc?view=revision&revision=1377807 Types: Permissions Required
Added Reference Type

								
							
							
						
MITRE: http://svn.apache.org/viewvc?view=revision&revision=1380829 Types: Permissions Required
Added Reference Type

								
							
							
						
MITRE: http://svn.apache.org/viewvc?view=revision&revision=1392248 Types: Permissions Required
Added Reference Type

								
							
							
						
MITRE: http://www-01.ibm.com/support/docview.wss?uid=swg21626891 Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: http://www.securityfocus.com/bid/56403 Types: Broken Link
Added Reference Type

								
							
							
						
MITRE: http://www.ubuntu.com/usn/USN-1637-1 Types: Third Party Advisory
Added Reference Type

								
							
							
						
MITRE: https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 Types: Third Party Advisory, VDB Entry