Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/941364?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/941364?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u11?distro=trixie", "type": "deb", "namespace": "debian", "name": "tomcat9", "version": "9.0.43-2~deb11u11", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "9.0.43-2~deb11u12", "latest_non_vulnerable_version": "9.0.115-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4439?format=api", "vulnerability_id": "VCID-3vdn-j7sj-dfdn", "summary": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89.\n\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue.\n\n\n\nApache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38286.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38286.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-38286", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60801", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60779", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60798", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60812", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6079", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60726", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60761", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60731", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-38286" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/tomcat", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat" }, { "reference_url": "https://github.com/apache/tomcat/commit/3197862639732e16ec1164557bcd289ebc116c93", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/3197862639732e16ec1164557bcd289ebc116c93" }, { "reference_url": "https://github.com/apache/tomcat/commit/3344c17cef094da4bb616f4186ed32039627b543", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/3344c17cef094da4bb616f4186ed32039627b543" }, { "reference_url": "https://github.com/apache/tomcat/commit/76c5cce6f0bcef14b0c21c38910371ca7d322d13", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/76c5cce6f0bcef14b0c21c38910371ca7d322d13" }, { "reference_url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T16:33:49Z/" } ], "url": "https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38286" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20241101-0010", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20241101-0010" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/09/23/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "7.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2024/09/23/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686", "reference_id": "2314686", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38286", "reference_id": "CVE-2024-38286", "reference_type": "", "scores": [ { "value": "Important", "scoring_system": "apache_tomcat", "scoring_elements": "" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38286" }, { "reference_url": "https://github.com/advisories/GHSA-7jqf-v358-p8g7", "reference_id": "GHSA-7jqf-v358-p8g7", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-7jqf-v358-p8g7" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4976", "reference_id": "RHSA-2024:4976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4977", "reference_id": "RHSA-2024:4977", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5024", "reference_id": "RHSA-2024:5024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5025", "reference_id": "RHSA-2024:5025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5693", "reference_id": "RHSA-2024:5693", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5694", "reference_id": "RHSA-2024:5694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5695", "reference_id": "RHSA-2024:5695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5696", "reference_id": "RHSA-2024:5696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5696" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8494", "reference_id": "RHSA-2024:8494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8497", "reference_id": "RHSA-2024:8497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8528", "reference_id": "RHSA-2024:8528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8528" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8543", "reference_id": "RHSA-2024:8543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8567", "reference_id": "RHSA-2024:8567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8572", "reference_id": "RHSA-2024:8572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8572" }, { "reference_url": "https://usn.ubuntu.com/7562-1/", "reference_id": "USN-7562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941336?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941364?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941334?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.70-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.70-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941338?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.95-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.95-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941337?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.115-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.115-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-38286", "GHSA-7jqf-v358-p8g7" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vdn-j7sj-dfdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4432?format=api", "vulnerability_id": "VCID-43j2-w5xt-43g9", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56337.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56337.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56337", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11183", "scoring_system": "epss", "scoring_elements": "0.93469", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.93641", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.93637", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.9363", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.93611", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.9361", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.93604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.93602", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.93593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.93592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11486", "scoring_system": "epss", "scoring_elements": "0.93646", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56337" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/tomcat", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat" }, { "reference_url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-08-13T13:28:46Z/" } ], "url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56337" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20250103-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20250103-0002" }, { "reference_url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34" }, { "reference_url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2" }, { "reference_url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2024-50379", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-08-13T13:28:46Z/" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521", "reference_id": "2333521", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337", "reference_id": "CVE-2024-56337", "reference_type": "", "scores": [ { "value": "Important", "scoring_system": "apache_tomcat", "scoring_elements": "" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337" }, { "reference_url": "https://github.com/advisories/GHSA-27hp-xhwr-wr2m", "reference_id": "GHSA-27hp-xhwr-wr2m", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-27hp-xhwr-wr2m" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11332", "reference_id": "RHSA-2025:11332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11333", "reference_id": "RHSA-2025:11333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11334", "reference_id": "RHSA-2025:11334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11335", "reference_id": "RHSA-2025:11335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11381", "reference_id": "RHSA-2025:11381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11382", "reference_id": "RHSA-2025:11382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4521", "reference_id": "RHSA-2025:4521", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4522", "reference_id": "RHSA-2025:4522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4522" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941336?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941364?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941334?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.70-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.70-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941338?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.95-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.95-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941337?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.115-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.115-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-56337", "GHSA-27hp-xhwr-wr2m" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43j2-w5xt-43g9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4437?format=api", "vulnerability_id": "VCID-8mns-kw6c-a7dk", "summary": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52316.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52316.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-52316", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01353", "scoring_system": "epss", "scoring_elements": "0.80071", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01353", "scoring_system": "epss", "scoring_elements": "0.80109", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01353", "scoring_system": "epss", "scoring_elements": "0.8008", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01353", "scoring_system": "epss", "scoring_elements": "0.80092", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01828", "scoring_system": "epss", "scoring_elements": "0.82936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01828", "scoring_system": "epss", "scoring_elements": "0.82897", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01828", "scoring_system": "epss", "scoring_elements": "0.8289", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01828", "scoring_system": "epss", "scoring_elements": "0.82901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01828", "scoring_system": "epss", "scoring_elements": "0.82906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02463", "scoring_system": "epss", "scoring_elements": "0.85291", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02463", "scoring_system": "epss", "scoring_elements": "0.85267", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-52316" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/tomcat", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat" }, { "reference_url": "https://github.com/apache/tomcat/commit/6d097a66746635df6880fe7662a792156b0eca14", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/6d097a66746635df6880fe7662a792156b0eca14" }, { "reference_url": "https://github.com/apache/tomcat/commit/7532f9dc4a8c37ec958f79dc82c4924a6c539223", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/7532f9dc4a8c37ec958f79dc82c4924a6c539223" }, { "reference_url": "https://github.com/apache/tomcat/commit/acc2f01395f895980f5d8a64573fcc1bade13369", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/acc2f01395f895980f5d8a64573fcc1bade13369" }, { "reference_url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-18T14:50:59Z/" } ], "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20250124-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20250124-0003" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/11/18/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2024/11/18/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972", "reference_id": "2326972", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52316", "reference_id": "CVE-2024-52316", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "apache_tomcat", "scoring_elements": "" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52316" }, { "reference_url": "https://github.com/advisories/GHSA-xcpr-7mr4-h4xq", "reference_id": "GHSA-xcpr-7mr4-h4xq", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-xcpr-7mr4-h4xq" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3608", "reference_id": "RHSA-2025:3608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3609", "reference_id": "RHSA-2025:3609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7497", "reference_id": "RHSA-2025:7497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7497" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941336?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941364?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941334?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.70-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.70-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941338?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.95-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.95-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941337?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.115-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.115-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-52316", "GHSA-xcpr-7mr4-h4xq" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8mns-kw6c-a7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4473?format=api", "vulnerability_id": "VCID-k9cg-ehdw-dbh6", "summary": "Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Other, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21733.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21733.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21733", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.9881", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98789", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98792", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98796", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98798", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.988", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98805", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.73428", "scoring_system": "epss", "scoring_elements": "0.98807", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21733" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/tomcat", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat" }, { "reference_url": "https://github.com/apache/tomcat/commit/86ccc43940861703c2be96a5f35384407522125a", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/86ccc43940861703c2be96a5f35384407522125a" }, { "reference_url": "https://github.com/apache/tomcat/commit/ce4b154e7b48f66bd98858626347747cd2514311", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/ce4b154e7b48f66bd98858626347747cd2514311" }, { "reference_url": "https://lists.apache.org/thread/h9bjqdd0odj6lhs2o96qgowcc6hb0cfz", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:09:11Z/" } ], "url": "https://lists.apache.org/thread/h9bjqdd0odj6lhs2o96qgowcc6hb0cfz" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21733", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21733" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240216-0005", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240216-0005" }, { "reference_url": "https://tomcat.apache.org/security-8.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-8.html" }, { "reference_url": "https://tomcat.apache.org/security-9.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-9.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/01/19/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2024/01/19/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259204", "reference_id": "2259204", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21733", "reference_id": "CVE-2024-21733", "reference_type": "", "scores": [ { "value": "Important", "scoring_system": "apache_tomcat", "scoring_elements": "" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21733" }, { "reference_url": "https://github.com/advisories/GHSA-f4qf-m5gf-8jm8", "reference_id": "GHSA-f4qf-m5gf-8jm8", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-f4qf-m5gf-8jm8" }, { "reference_url": "https://usn.ubuntu.com/7562-1/", "reference_id": "USN-7562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7562-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941336?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941364?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941351?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.53-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.53-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941334?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.70-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.70-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941338?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.95-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.95-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941337?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.115-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.115-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-21733", "GHSA-f4qf-m5gf-8jm8" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k9cg-ehdw-dbh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4434?format=api", "vulnerability_id": "VCID-v8ku-sjc8-wfga", "summary": "", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50379.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50379.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-50379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.8616", "scoring_system": "epss", "scoring_elements": "0.99403", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.8616", "scoring_system": "epss", "scoring_elements": "0.99402", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.99411", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.99416", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.99409", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.99412", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.99408", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.9941", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.99417", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.99414", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.86495", "scoring_system": "epss", "scoring_elements": "0.99413", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.87447", "scoring_system": "epss", "scoring_elements": "0.99451", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-50379" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/tomcat", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat" }, { "reference_url": "https://github.com/apache/tomcat/commit/05ddeeaa54df1e2dc427d0164bedd6b79f78d81f", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/05ddeeaa54df1e2dc427d0164bedd6b79f78d81f" }, { "reference_url": "https://github.com/apache/tomcat/commit/43b507ebac9d268b1ea3d908e296cc6e46795c00", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/43b507ebac9d268b1ea3d908e296cc6e46795c00" }, { "reference_url": "https://github.com/apache/tomcat/commit/631500b0c9b2a2a2abb707e3de2e10a5936e5d41", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/631500b0c9b2a2a2abb707e3de2e10a5936e5d41" }, { "reference_url": "https://github.com/apache/tomcat/commit/684247ae85fa633b9197b32391de59fc54703842", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/684247ae85fa633b9197b32391de59fc54703842" }, { "reference_url": "https://github.com/apache/tomcat/commit/8554f6b1722b33a2ce8b0a3fad37825f3a75f2d2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/8554f6b1722b33a2ce8b0a3fad37825f3a75f2d2" }, { "reference_url": "https://github.com/apache/tomcat/commit/cc7a98b57c6dc1df21979fcff94a36e068f4456c", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/tomcat/commit/cc7a98b57c6dc1df21979fcff94a36e068f4456c" }, { "reference_url": "https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-17T16:54:54Z/" } ], "url": "https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50379", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50379" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20250103-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20250103-0003" }, { "reference_url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34" }, { "reference_url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2" }, { "reference_url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/12/17/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2024/12/17/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/12/18/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2024/12/18/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332817", "reference_id": "2332817", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379", "reference_id": "CVE-2024-50379", "reference_type": "", "scores": [ { "value": "Important", "scoring_system": "apache_tomcat", "scoring_elements": "" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379" }, { "reference_url": "https://github.com/advisories/GHSA-5j33-cvvr-w245", "reference_id": "GHSA-5j33-cvvr-w245", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5j33-cvvr-w245" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0342", "reference_id": "RHSA-2025:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0343", "reference_id": "RHSA-2025:0343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0361", "reference_id": "RHSA-2025:0361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0362", "reference_id": "RHSA-2025:0362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1920", "reference_id": "RHSA-2025:1920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3645", "reference_id": "RHSA-2025:3645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3645" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3646", "reference_id": "RHSA-2025:3646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3647", "reference_id": "RHSA-2025:3647", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3683", "reference_id": "RHSA-2025:3683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3684", "reference_id": "RHSA-2025:3684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3684" }, { "reference_url": "https://usn.ubuntu.com/7705-1/", "reference_id": "USN-7705-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7705-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941336?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941364?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.43-2~deb11u11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941334?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.70-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.70-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941338?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.95-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.95-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/941337?format=api", "purl": "pkg:deb/debian/tomcat9@9.0.115-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.115-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-50379", "GHSA-5j33-cvvr-w245" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8ku-sjc8-wfga" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat9@9.0.43-2~deb11u11%3Fdistro=trixie" }