| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-246u-a4rh-yyd4 |
| vulnerability_id |
VCID-246u-a4rh-yyd4 |
| summary |
Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions
may also be affected.
Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-49125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35525 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35515 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3549 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35444 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35536 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35561 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57458 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.5746 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57481 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57485 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00349 |
| scoring_system |
epss |
| scoring_elements |
0.57477 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-49125 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-49125, GHSA-wc4r-xq3c-5cf3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-246u-a4rh-yyd4 |
|
| 1 |
| url |
VCID-2kku-pzer-9ufv |
| vulnerability_id |
VCID-2kku-pzer-9ufv |
| summary |
Session Fixation vulnerability in Apache Tomcat via rewrite valve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
Older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55668 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03655 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0368 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0367 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03594 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0362 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03645 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03668 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03706 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03684 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04307 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04436 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55668 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-55668, GHSA-23hv-mwm6-g8jf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2kku-pzer-9ufv |
|
| 2 |
| url |
VCID-2rmy-13ym-3bgm |
| vulnerability_id |
VCID-2rmy-13ym-3bgm |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34483 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08877 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08832 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08846 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23995 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24008 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23977 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34483 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34483, GHSA-rv64-5gf8-9qq8
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rmy-13ym-3bgm |
|
| 3 |
| url |
VCID-43j2-w5xt-43g9 |
| vulnerability_id |
VCID-43j2-w5xt-43g9 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-56337 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11183 |
| scoring_system |
epss |
| scoring_elements |
0.93469 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.93637 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.9363 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.93611 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.9361 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.93604 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.93602 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.93593 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.93592 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.11486 |
| scoring_system |
epss |
| scoring_elements |
0.93641 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-56337 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://www.cve.org/CVERecord?id=CVE-2024-50379 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-08-13T13:28:46Z/ |
|
|
| url |
https://www.cve.org/CVERecord?id=CVE-2024-50379 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-56337, GHSA-27hp-xhwr-wr2m
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-43j2-w5xt-43g9 |
|
| 4 |
| url |
VCID-4cag-c4pb-dfaz |
| vulnerability_id |
VCID-4cag-c4pb-dfaz |
| summary |
Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-61795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.25512 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00089 |
| scoring_system |
epss |
| scoring_elements |
0.2555 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32096 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32084 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32116 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32154 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.3215 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32123 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32118 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32068 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33823 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-61795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-61795, GHSA-hgrr-935x-pq79
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4cag-c4pb-dfaz |
|
| 5 |
| url |
VCID-5sgv-7nsz-5fa8 |
| vulnerability_id |
VCID-5sgv-7nsz-5fa8 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24813 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.94165 |
| scoring_system |
epss |
| scoring_elements |
0.99917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.94165 |
| scoring_system |
epss |
| scoring_elements |
0.99918 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.94165 |
| scoring_system |
epss |
| scoring_elements |
0.99916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.94192 |
| scoring_system |
epss |
| scoring_elements |
0.9992 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.94192 |
| scoring_system |
epss |
| scoring_elements |
0.99921 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24813 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/apache/tomcat |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
9.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/tomcat |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
10 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 2 |
| value |
9.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-04-01T19:37:06Z/ |
|
|
| url |
https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-24813, GHSA-83qj-6fr2-vhqg
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgv-7nsz-5fa8 |
|
| 6 |
| url |
VCID-8mns-kw6c-a7dk |
| vulnerability_id |
VCID-8mns-kw6c-a7dk |
| summary |
Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-52316 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01353 |
| scoring_system |
epss |
| scoring_elements |
0.80071 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01353 |
| scoring_system |
epss |
| scoring_elements |
0.80109 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01353 |
| scoring_system |
epss |
| scoring_elements |
0.8008 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01353 |
| scoring_system |
epss |
| scoring_elements |
0.80092 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01828 |
| scoring_system |
epss |
| scoring_elements |
0.82906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01828 |
| scoring_system |
epss |
| scoring_elements |
0.8289 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01828 |
| scoring_system |
epss |
| scoring_elements |
0.82936 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01828 |
| scoring_system |
epss |
| scoring_elements |
0.82897 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01828 |
| scoring_system |
epss |
| scoring_elements |
0.82901 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02463 |
| scoring_system |
epss |
| scoring_elements |
0.85267 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-52316 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-52316, GHSA-xcpr-7mr4-h4xq
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8mns-kw6c-a7dk |
|
| 7 |
| url |
VCID-b3bb-9ajg-sfc9 |
| vulnerability_id |
VCID-b3bb-9ajg-sfc9 |
| summary |
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single
request as multiple requests leading to the possibility of request
smuggling when behind a reverse proxy.
Older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46589 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97896 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97895 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97885 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.9788 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97875 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97872 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97871 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97886 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.51432 |
| scoring_system |
epss |
| scoring_elements |
0.97882 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.57888 |
| scoring_system |
epss |
| scoring_elements |
0.98185 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46589 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46589, GHSA-fccv-jmmp-qg76
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b3bb-9ajg-sfc9 |
|
| 8 |
| url |
VCID-cfhw-vmcp-y3bc |
| vulnerability_id |
VCID-cfhw-vmcp-y3bc |
| summary |
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55754 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28878 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28928 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32026 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32065 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32061 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32003 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31993 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32032 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.3221 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00128 |
| scoring_system |
epss |
| scoring_elements |
0.32204 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55754 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/apache/tomcat |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
|
| 1 |
| value |
2.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/tomcat |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-55754, GHSA-vfww-5hm6-hx2j
|
| risk_score |
4.3 |
| exploitability |
0.5 |
| weighted_severity |
8.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cfhw-vmcp-y3bc |
|
| 9 |
| url |
VCID-d1fm-vbd1-n7au |
| vulnerability_id |
VCID-d1fm-vbd1-n7au |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34487 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08877 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08832 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08846 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23995 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24008 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23977 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34487 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34487, GHSA-x4m4-345f-5h5g
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d1fm-vbd1-n7au |
|
| 10 |
| url |
VCID-gb2v-96xj-ybad |
| vulnerability_id |
VCID-gb2v-96xj-ybad |
| summary |
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may also be affected.
Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-48988 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50513 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50471 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50478 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50424 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.5047 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0027 |
| scoring_system |
epss |
| scoring_elements |
0.50441 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73315 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73352 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73359 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00759 |
| scoring_system |
epss |
| scoring_elements |
0.73351 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-48988 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/apache/tomcat |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/tomcat |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://tomcat.apache.org/security-9.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://tomcat.apache.org/security-9.html |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-48988, GHSA-h3gc-qfqq-6h8f
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gb2v-96xj-ybad |
|
| 11 |
| url |
VCID-gvhy-d4gm-57d3 |
| vulnerability_id |
VCID-gvhy-d4gm-57d3 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54677 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.79165 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.79169 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.79152 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.79167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.79143 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.79135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.7911 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.79125 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01228 |
| scoring_system |
epss |
| scoring_elements |
0.79098 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54677 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/apache/tomcat |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/tomcat |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-54677, GHSA-653p-vg55-5652
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gvhy-d4gm-57d3 |
|
| 12 |
| url |
VCID-gyed-x6s8-ybhr |
| vulnerability_id |
VCID-gyed-x6s8-ybhr |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24880 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08236 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08199 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08216 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44021 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44031 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43957 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24880 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-24880, GHSA-563x-q5rq-57qp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gyed-x6s8-ybhr |
|
| 13 |
| url |
VCID-k59r-wjt3-wqe5 |
| vulnerability_id |
VCID-k59r-wjt3-wqe5 |
| summary |
For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions
may also be affected.
Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-52520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.3921 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46285 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46228 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46219 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46247 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46223 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46221 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46165 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46225 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00234 |
| scoring_system |
epss |
| scoring_elements |
0.46282 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-52520 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-52520, GHSA-wr62-c79q-cv37
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k59r-wjt3-wqe5 |
|
| 14 |
| url |
VCID-maw6-4qs5-ykae |
| vulnerability_id |
VCID-maw6-4qs5-ykae |
| summary |
Improper Input Validation vulnerability.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.
Tomcat did not validate that the host name provided via the SNI
extension was the same as the host name provided in the HTTP host header
field. If Tomcat was configured with more than one virtual host and the
TLS configuration for one of those hosts did not require client
certificate authentication but another one did, it was possible for a
client to bypass the client certificate authentication by sending
different host names in the SNI extension and the HTTP host header field.
The vulnerability only applies if client certificate authentication is
only enforced at the Connector. It does not apply if client certificate
authentication is enforced at the web application.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-66614 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13221 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13128 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13222 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1327 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13349 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13413 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13309 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1329 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13209 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-66614 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/apache/tomcat |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/tomcat |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L |
|
| 1 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-21T21:17:26Z/ |
|
|
| url |
https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://tomcat.apache.org/security-9.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://tomcat.apache.org/security-9.html |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-66614, GHSA-fpj8-gq4v-p354
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-maw6-4qs5-ykae |
|
| 15 |
| url |
VCID-sr8e-w1qk-r7fz |
| vulnerability_id |
VCID-sr8e-w1qk-r7fz |
| summary |
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may also be affected.
Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-46701 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32703 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32726 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32686 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32748 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32722 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32674 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32817 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32713 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-46701 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-46701, GHSA-h2fw-rfh5-95r3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sr8e-w1qk-r7fz |
|
| 16 |
| url |
VCID-v7tp-1t4h-zqeg |
| vulnerability_id |
VCID-v7tp-1t4h-zqeg |
| summary |
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
Older, EOL versions may also be affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28708 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25128 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.2509 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24972 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24903 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27837 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.2789 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27932 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27815 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27831 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27931 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27773 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28708 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28708, GHSA-2c9m-w27f-53rm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v7tp-1t4h-zqeg |
|
| 17 |
| url |
VCID-v8ku-sjc8-wfga |
| vulnerability_id |
VCID-v8ku-sjc8-wfga |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50379 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.8616 |
| scoring_system |
epss |
| scoring_elements |
0.99402 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.99417 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.99409 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.99416 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.99413 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.99412 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.99411 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.9941 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.99408 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.86495 |
| scoring_system |
epss |
| scoring_elements |
0.99414 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.87447 |
| scoring_system |
epss |
| scoring_elements |
0.99451 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50379 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/apache/tomcat |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/tomcat |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-50379, GHSA-5j33-cvvr-w245
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v8ku-sjc8-wfga |
|
| 18 |
| url |
VCID-xqjr-7xfw-mbh2 |
| vulnerability_id |
VCID-xqjr-7xfw-mbh2 |
| summary |
Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55752 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31592 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34655 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37934 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37913 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37914 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.3795 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37922 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00169 |
| scoring_system |
epss |
| scoring_elements |
0.38046 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38337 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38312 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55752 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/apache/tomcat |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/tomcat |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-55752, GHSA-wmwf-9ccg-fff5
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xqjr-7xfw-mbh2 |
|
| 19 |
| url |
VCID-y9ne-rw7e-vugf |
| vulnerability_id |
VCID-y9ne-rw7e-vugf |
| summary |
Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.
Older, EOL versions are also affected.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24733 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40245 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40354 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40326 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40363 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40352 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.4034 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40289 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40364 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40339 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24733 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-24733, GHSA-qq5r-98hh-rxc9
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y9ne-rw7e-vugf |
|
| 20 |
| url |
VCID-zw2q-kna8-mqcm |
| vulnerability_id |
VCID-zw2q-kna8-mqcm |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25854 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07234 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10503 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10375 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00829 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00834 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00828 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25854 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/apache/tomcat |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/tomcat |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-25854, GHSA-9m3c-qcxr-9x87
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zw2q-kna8-mqcm |
|
|