A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T22:40:31.832Z
Reserved: 2021-04-13T00:00:00
Link: CVE-2021-30640

No data.

Status : Modified
Published: 2021-07-12T15:15:08.367
Modified: 2024-11-21T06:04:20.893
Link: CVE-2021-30640
