[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2023-28709Date: (C)2023-05-23   (M)2024-05-10


The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount��could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters��in the query string, the limit for uploaded request parts could be��bypassed with the potential for a denial of service to occur.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score :
Exploit Score: 3.9Exploit Score:
Impact Score: 3.6Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: NONEAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: NONEAvailability:
Integrity: NONE 
Availability: HIGH 
  
Reference:
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
https://security.gentoo.org/glsa/202305-37
https://security.netapp.com/advisory/ntap-20230616-0004/
https://www.debian.org/security/2023/dsa-5521

CWE    1
CWE-193
OVAL    19
oval:org.secpod.oval:def:508075
oval:org.secpod.oval:def:2108009
oval:org.secpod.oval:def:19500293
oval:org.secpod.oval:def:2600384
...

© SecPod Technologies