7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.922 High
EPSS
Percentile
98.9%
Information disclosure due to concurrency bug (CVE-2021-43980) Fix for CVE-2020-9484 introduced a time of check, time of use vulnerability (CVE-2022-23181) Correct documentation to warn of use over untrusted networks. (CVE-2022-29885) Correct documentation showing use of XSS vulnerability. (CVE-2022-34305) Fix to reject invalid Content-Length header (CVE-2022-42252) Fix escaping of the type, message or description values. (CVE-2022-45143) Fix FileUpload limiting of the number of request parts to be processed to prevent the possibility of an attacker triggering a DoS (CVE-2023-24998) Fix setting of session cookie secure attribute when using RemoteIpFilter with X-Forwarded-Proto header set to https (CVE-2023-28708) Obsolete tomcat-jsvc
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Mageia | 8 | noarch | tomcat | < 9.0.73-1.1 | tomcat-9.0.73-1.1.mga8 |
bugs.mageia.org/show_bug.cgi?id=30113
lists.suse.com/pipermail/sle-security-updates/2022-April/010734.html
lists.suse.com/pipermail/sle-security-updates/2022-March/010339.html
lists.suse.com/pipermail/sle-security-updates/2023-March/014018.html
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.62
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.65
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.68
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.69
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.71
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.72
www.debian.org/lts/security/2022/dla-3160
www.debian.org/security/2022/dsa-5265
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.922 High
EPSS
Percentile
98.9%