VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
JVNDB-2025-004347     ( CVE-2025-31651 | CVE-2025-31651 )
Apache Software Foundation の Apache Tomcat におけるエンコードおよびエスケープに関する脆弱性
https://jvndb.jvn.jp/ja/contents/2025/JVNDB-2025-004347.html

Original

Apache Software Foundation の Apache Tomcat には、エンコードおよびエスケープに関する脆弱性が存在します。

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
JVN iPedia
First Published:
2025-05-07
Source Information Category:
Advisory, Alert
Last Updated:
2025-05-07




Affected Product Tags
cpe:/a:apache:tomcat
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
Complete [?]

Alternatives
Common Vulnerabilities and Exposures (CVE) CVE-2025-31651




National Vulnerability Database (NVD) CVE-2025-31651








References
Apache Tomcat Fixed_in_Apache_Tomcat_11.0.6




JVNDB CWE-116 不適切なエンコード、または出力のエスケープ




Pony Mail [SECURITY] CVE-2025-31651 Apache Tomcat - Rewrite rule bypass




関連文書 www.openwall.com (oss-security/2025/04/28/3)





Copyright © 2025 JPCERT/CC All Rights Reserved.