Search for vulnerabilities
Vulnerability details: VCID-gte7-xda1-aaas
Vulnerability ID VCID-gte7-xda1-aaas
Aliases CVE-2005-3510
GHSA-8f4w-jwqv-5cxc
Summary Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual HIGH http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
generic_textual LOW http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
rhas Moderate https://access.redhat.com/errata/RHSA-2006:0161
rhas Important https://access.redhat.com/errata/RHSA-2007:0340
rhas Moderate https://access.redhat.com/errata/RHSA-2007:1069
rhas Moderate https://access.redhat.com/errata/RHSA-2008:0261
rhas Low https://access.redhat.com/errata/RHSA-2008:0524
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0602
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.00984 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.02137 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.02137 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.02137 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.02137 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.20508 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
epss 0.24037 https://api.first.org/data/v1/epss?cve=CVE-2005-3510
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=237085
apache_tomcat Important https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510
generic_textual MODERATE http://secunia.com/advisories/30899
generic_textual MODERATE http://secunia.com/advisories/30908
generic_textual MODERATE http://secunia.com/advisories/33668
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-8f4w-jwqv-5cxc
generic_textual HIGH https://github.com/apache/tomcat
cvssv3.1 4.2 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
cvssv3.1 4.2 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
cvssv3.1 4.2 https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
cvssv3.1 4.2 https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
cvssv3.1 4.2 https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
cvssv3.1 4.2 https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2005-3510
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2005-3510
generic_textual HIGH http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
generic_textual LOW http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
generic_textual HIGH http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
generic_textual LOW http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
generic_textual HIGH https://web.archive.org/web/20200228054210/http://www.securityfocus.com/archive/1/415782/30/0/threaded
generic_textual HIGH https://web.archive.org/web/20200229175931/http://www.securityfocus.com/bid/15325
generic_textual HIGH https://web.archive.org/web/20200517122628/http://www.securityfocus.com/archive/1/500396/100/0/threaded
generic_textual HIGH https://web.archive.org/web/20200517153851/http://www.securityfocus.com/archive/1/500412/100/0/threaded
generic_textual HIGH https://web.archive.org/web/20200922015809/http://securitytracker.com/id?1015147
cvssv3.1 4.2 http://tomcat.apache.org/security-4.html
generic_textual HIGH http://tomcat.apache.org/security-4.html
generic_textual MODERATE http://tomcat.apache.org/security-4.html
cvssv3.1 4.2 http://tomcat.apache.org/security-5.html
generic_textual HIGH http://tomcat.apache.org/security-5.html
generic_textual MODERATE http://tomcat.apache.org/security-5.html
generic_textual HIGH http://www.redhat.com/support/errata/RHSA-2006-0161.html
generic_textual MODERATE http://www.redhat.com/support/errata/RHSA-2006-0161.html
generic_textual HIGH http://www.redhat.com/support/errata/RHSA-2008-0261.html
generic_textual LOW http://www.redhat.com/support/errata/RHSA-2008-0261.html
generic_textual MODERATE http://www.securityfocus.com/archive/1/500396/100/0/threaded
generic_textual MODERATE http://www.securityfocus.com/archive/1/500412/100/0/threaded
generic_textual MODERATE http://www.vupen.com/english/advisories/2008/1979/references
generic_textual MODERATE http://www.vupen.com/english/advisories/2009/0233
Reference id Reference type URL
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3510.json
https://api.first.org/data/v1/epss?cve=CVE-2005-3510
http://secunia.com/advisories/17416
http://secunia.com/advisories/30899
http://secunia.com/advisories/30908
http://secunia.com/advisories/33668
http://securitytracker.com/id?1015147
https://github.com/apache/tomcat
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
https://web.archive.org/web/20200228054210/http://www.securityfocus.com/archive/1/415782/30/0/threaded
https://web.archive.org/web/20200229175931/http://www.securityfocus.com/bid/15325
https://web.archive.org/web/20200517122628/http://www.securityfocus.com/archive/1/500396/100/0/threaded
https://web.archive.org/web/20200517153851/http://www.securityfocus.com/archive/1/500412/100/0/threaded
https://web.archive.org/web/20200922015809/http://securitytracker.com/id?1015147
http://tomcat.apache.org/security-4.html
http://tomcat.apache.org/security-5.html
http://www.osvdb.org/20439
http://www.redhat.com/support/errata/RHSA-2006-0161.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.securityfocus.com/archive/1/415782/30/0/threaded
http://www.securityfocus.com/archive/1/500396/100/0/threaded
http://www.securityfocus.com/archive/1/500412/100/0/threaded
http://www.securityfocus.com/bid/15325
http://www.vupen.com/english/advisories/2008/1979/references
http://www.vupen.com/english/advisories/2009/0233
237085 https://bugzilla.redhat.com/show_bug.cgi?id=237085
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
CVE-2005-3510 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510
CVE-2005-3510 https://nvd.nist.gov/vuln/detail/CVE-2005-3510
GHSA-8f4w-jwqv-5cxc https://github.com/advisories/GHSA-8f4w-jwqv-5cxc
RHSA-2006:0161 https://access.redhat.com/errata/RHSA-2006:0161
RHSA-2007:0340 https://access.redhat.com/errata/RHSA-2007:0340
RHSA-2007:1069 https://access.redhat.com/errata/RHSA-2007:1069
RHSA-2008:0261 https://access.redhat.com/errata/RHSA-2008:0261
RHSA-2008:0524 https://access.redhat.com/errata/RHSA-2008:0524
RHSA-2010:0602 https://access.redhat.com/errata/RHSA-2010:0602
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2005-3510
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at http://tomcat.apache.org/security-4.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at http://tomcat.apache.org/security-5.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.83908
EPSS Score 0.00984
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.