U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-45648

Change History

Initial Analysis by NIST 10/16/2023 11:43:48 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 8.5.0 up to (excluding) 8.5.94
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 9.0.1 up to (excluding) 9.0.81
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone10:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone11:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone12:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone13:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone14:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone15:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone16:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone17:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone18:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone19:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone20:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone6:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone7:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone8:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:10.1.0:milestone9:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 10.1.1 up to (excluding) 10.1.14
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*
     *cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Added CWE

								
							
							
						
NIST NVD-CWE-Other
Changed Reference Type
http://www.openwall.com/lists/oss-security/2023/10/10/10 No Types Assigned
http://www.openwall.com/lists/oss-security/2023/10/10/10 Mailing List, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp No Types Assigned
https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp Vendor Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html Mailing List, Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2023/dsa-5521 No Types Assigned
https://www.debian.org/security/2023/dsa-5521 Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2023/dsa-5522 No Types Assigned
https://www.debian.org/security/2023/dsa-5522 Third Party Advisory