RHSA-2026:12194

Vulnerability from csaf_redhat - Published: 2026-04-30 14:02 - Updated: 2026-04-30 21:34
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 6.2.2 release and security update
Severity
Moderate
Notes
Topic: Red Hat JBoss Web Server 6.2.2 is now available for Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Red Hat Enterprise Linux 10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release of Red Hat JBoss Web Server 6.2.2 serves as a replacement for Red Hat JBoss Web Server 6.2.1. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section. Security Fix(es): * tomcat: security constraint bypass with HTTP/0.9 (CVE-2026-24733) * tomcat: Client certificate verification bypass due to virtual host mapping (CVE-2025-66614) * tomcat: Apache Tomcat: Improper Input Validation vulnerability due to incomplete fix (CVE-2026-32990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A certificate validation flaw has been found in Apache Tomcat. omcat did not validate that the host name provided via the SNI extension was the same as the host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. The vulnerability only applies if client certificate authentication is only enforced at the Connector. It does not apply if client certificate authentication is enforced at the web application.

CWE-1289 - Improper Validation of Unsafe Equivalence in Input
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:12194
Workaround Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

A flaw was found in Tomcat. An improper input validation vulnerability allows an attacker to bypass security constraints. Specifically, if a security constraint is configured to permit HEAD requests to a URI but deny GET requests, a malformed or specification invalid HEAD request using the HTTP/0.9 protocol can bypass the intended denial rule, enabling an attacker to access resources that should be protected.

CWE-20 - Improper Input Validation
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:12194
Workaround To mitigate this vulnerability, ensure that security constraints are consistent across similar methods (e.g., if GET is denied, HEAD should likely be denied) or block HTTP/0.9 traffic via a reverse proxy or firewall, if it is not required.

A flaw was found in Apache Tomcat. This improper input validation vulnerability stems from an incomplete fix for a previous security issue (CVE-2025-66614). This flaw may allow an attacker to bypass security controls or cause unexpected behavior within the application.

CWE-184 - Incomplete List of Disallowed Inputs
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:12194
Workaround Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat JBoss Web Server 6.2.2 is now available for Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 6.2.2 serves as a replacement for Red Hat JBoss Web Server 6.2.1. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* tomcat: security constraint bypass with HTTP/0.9 (CVE-2026-24733)\n* tomcat: Client certificate verification bypass due to virtual host mapping (CVE-2025-66614)\n* tomcat: Apache Tomcat: Improper Input Validation vulnerability due to incomplete fix (CVE-2026-32990) \n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:12194",
        "url": "https://access.redhat.com/errata/RHSA-2026:12194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.2/html/red_hat_jboss_web_server_6.2_service_pack_2_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.2/html/red_hat_jboss_web_server_6.2_service_pack_2_release_notes/index"
      },
      {
        "category": "external",
        "summary": "2440430",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440430"
      },
      {
        "category": "external",
        "summary": "2440437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440437"
      },
      {
        "category": "external",
        "summary": "2457025",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457025"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_12194.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 6.2.2 release and security update",
    "tracking": {
      "current_release_date": "2026-04-30T21:34:38+00:00",
      "generator": {
        "date": "2026-04-30T21:34:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.7"
        }
      },
      "id": "RHSA-2026:12194",
      "initial_release_date": "2026-04-30T14:02:58+00:00",
      "revision_history": [
        {
          "date": "2026-04-30T14:02:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-30T14:02:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-04-30T21:34:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 6.2 on RHEL 10",
                "product": {
                  "name": "Red Hat JBoss Web Server 6.2 on RHEL 10",
                  "product_id": "10Base-JWS-6.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.2::el10"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 6.2 on RHEL 8",
                "product": {
                  "name": "Red Hat JBoss Web Server 6.2 on RHEL 8",
                  "product_id": "8Base-JWS-6.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.2::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 6.2 on RHEL 9",
                "product": {
                  "name": "Red Hat JBoss Web Server 6.2 on RHEL 9",
                  "product_id": "9Base-JWS-6.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.2::el9"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
                "product": {
                  "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
                  "product_id": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.49-10.redhat_00008.1.el10jws?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
                "product": {
                  "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
                  "product_id": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.49-10.redhat_00008.1.el8jws?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
                "product": {
                  "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
                  "product_id": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.49-10.redhat_00008.1.el9jws?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                "product": {
                  "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_id": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.49-10.redhat_00008.1.el10jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                "product": {
                  "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_id": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.49-10.redhat_00008.1.el8jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                "product": {
                  "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_id": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.49-10.redhat_00008.1.el9jws?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src"
        },
        "product_reference": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 10",
          "product_id": "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch"
        },
        "product_reference": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
        "relates_to_product_reference": "10Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src"
        },
        "product_reference": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 8",
          "product_id": "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch"
        },
        "product_reference": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
        "relates_to_product_reference": "8Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src"
        },
        "product_reference": "jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.2 on RHEL 9",
          "product_id": "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        },
        "product_reference": "jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
        "relates_to_product_reference": "9Base-JWS-6.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-66614",
      "cwe": {
        "id": "CWE-1289",
        "name": "Improper Validation of Unsafe Equivalence in Input"
      },
      "discovery_date": "2026-02-17T20:04:14.943661+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2440430"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A certificate validation flaw has been found in Apache Tomcat. omcat did not validate that the host name provided via the SNI extension was the same as the host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. The vulnerability only applies if client certificate authentication is only enforced at the Connector. It does not apply if client certificate authentication is enforced at the web application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Client certificate verification bypass due to virtual host mapping",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
          "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
          "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
          "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-66614"
        },
        {
          "category": "external",
          "summary": "RHBZ#2440430",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440430"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-66614",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66614",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66614"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7",
          "url": "https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7"
        }
      ],
      "release_date": "2026-02-17T18:48:30.577000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-30T14:02:58+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:12194"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: Client certificate verification bypass due to virtual host mapping"
    },
    {
      "cve": "CVE-2026-24733",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2026-02-17T20:05:04.953085+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2440437"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Tomcat. An improper input validation vulnerability allows an attacker to bypass security constraints. Specifically, if a security constraint is configured to permit HEAD requests to a URI but deny GET requests, a malformed or specification invalid HEAD request using the HTTP/0.9 protocol can bypass the intended denial rule, enabling an attacker to access resources that should be protected.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: security constraint bypass with HTTP/0.9",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is only exploitable when Tomcat is configured to allow HEAD requests but deny GET requests to the same resource, a very unlikely configuration. Due to this reason, this flaw has been rated with a low severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
          "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
          "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
          "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-24733"
        },
        {
          "category": "external",
          "summary": "RHBZ#2440437",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440437"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-24733",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24733",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24733"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread/6xk3t65qpn1myp618krtfotbjn1qt90f",
          "url": "https://lists.apache.org/thread/6xk3t65qpn1myp618krtfotbjn1qt90f"
        }
      ],
      "release_date": "2026-02-17T18:50:43.871000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-30T14:02:58+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:12194"
        },
        {
          "category": "workaround",
          "details": "To mitigate this vulnerability, ensure that security constraints are consistent across similar methods (e.g., if GET is denied, HEAD should likely be denied) or block HTTP/0.9 traffic via a reverse proxy or firewall, if it is not required.",
          "product_ids": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: security constraint bypass with HTTP/0.9"
    },
    {
      "cve": "CVE-2026-32990",
      "cwe": {
        "id": "CWE-184",
        "name": "Incomplete List of Disallowed Inputs"
      },
      "discovery_date": "2026-04-09T20:01:19.299996+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2457025"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Apache Tomcat. This improper input validation vulnerability stems from an incomplete fix for a previous security issue (CVE-2025-66614). This flaw may allow an attacker to bypass security controls or cause unexpected behavior within the application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Apache Tomcat: Apache Tomcat: Improper Input Validation vulnerability due to incomplete fix",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Moderate impact. This improper input validation vulnerability in Apache Tomcat, stemming from an incomplete fix for CVE-2025-66614, affects Red Hat JBoss Web Server and Red Hat Enterprise Linux. An attacker could exploit this flaw to bypass security controls or induce unexpected application behavior.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
          "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
          "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
          "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
          "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-32990"
        },
        {
          "category": "external",
          "summary": "RHBZ#2457025",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457025"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-32990",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-32990"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-32990",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32990"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread/1nl9zqft0ksqlhlkd3j4obyjz1ghoyn7",
          "url": "https://lists.apache.org/thread/1nl9zqft0ksqlhlkd3j4obyjz1ghoyn7"
        }
      ],
      "release_date": "2026-04-09T19:23:49.618000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-30T14:02:58+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:12194"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el10jws.src",
            "10Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "10Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el10jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el8jws.src",
            "8Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "8Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el8jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-0:10.1.49-10.redhat_00008.1.el9jws.src",
            "9Base-JWS-6.2:jws6-tomcat-admin-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-docs-webapp-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-el-5.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-javadoc-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-jsp-3.1-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-lib-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-selinux-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-servlet-6.0-api-0:10.1.49-10.redhat_00008.1.el9jws.noarch",
            "9Base-JWS-6.2:jws6-tomcat-webapps-0:10.1.49-10.redhat_00008.1.el9jws.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Apache Tomcat: Apache Tomcat: Improper Input Validation vulnerability due to incomplete fix"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…