It was discovered that Tomcat did not properly manage HTTP/2 streams. An attacker could possibly use this to cause Tomcat to consume resources, resulting in a denial of service. (CVE-2020-11996)
It was discovered that Tomcat did not properly release the HTTP/1.1 processor after the upgrade to HTTP/2. An attacker could possibly use this to generate an OutOfMemoryException, resulting in a denial of service. (CVE-2020-13934)
It was discovered that Tomcat did not properly validate the payload length in a WebSocket frame. An attacker could possibly use this to trigger an infinite loop, resulting in a denial of service. (CVE-2020-13935)
It was discovered that Tomcat did not properly deserialize untrusted data. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-9484)
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libtomcat9-embed-java",
            "binary_version": "9.0.31-1ubuntu0.1"
        },
        {
            "binary_name": "libtomcat9-java",
            "binary_version": "9.0.31-1ubuntu0.1"
        },
        {
            "binary_name": "tomcat9",
            "binary_version": "9.0.31-1ubuntu0.1"
        },
        {
            "binary_name": "tomcat9-admin",
            "binary_version": "9.0.31-1ubuntu0.1"
        },
        {
            "binary_name": "tomcat9-common",
            "binary_version": "9.0.31-1ubuntu0.1"
        },
        {
            "binary_name": "tomcat9-docs",
            "binary_version": "9.0.31-1ubuntu0.1"
        },
        {
            "binary_name": "tomcat9-examples",
            "binary_version": "9.0.31-1ubuntu0.1"
        },
        {
            "binary_name": "tomcat9-user",
            "binary_version": "9.0.31-1ubuntu0.1"
        }
    ]
}
          {
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "id": "CVE-2020-9484",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ]
        },
        {
            "id": "CVE-2020-11996",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2020-13934",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2020-13935",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ]
}