7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.015 Low
EPSS
Percentile
84.8%
org.apache.tomcat:tomcat is vulnerable to denial of service attacks. A malicious user is able to cause denial of service conditions, when running over an untrusted network because EncryptInterceptor
does not provide protection against DoS attacks.
packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
github.com/apache/tomcat/commit/0fa7721f11d565a2cd2e44366c388ad6a3e6357d
github.com/apache/tomcat/commit/36826ea638457d7e17876a70f89cb435b6db0d91
github.com/apache/tomcat/commit/b679bc627f5a4ea6510af95adfb7476b07eba890
github.com/apache/tomcat/commit/eaafd28296c54d983e28a47953c1f5cb2c334f48
lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv
lists.debian.org/debian-lts-announce/2022/10/msg00029.html
security.netapp.com/advisory/ntap-20220629-0002/
tomcat.apache.org/security-10.html
tomcat.apache.org/security-8.html
tomcat.apache.org/security-9.html
www.debian.org/security/2022/dsa-5265
www.oracle.com/security-alerts/cpujul2022.html
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.015 Low
EPSS
Percentile
84.8%