A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.debian.org/security/2021/dsa-4986
https://www.debian.org/security/2021/dsa-4952
https://security.netapp.com/advisory/ntap-20210827-0007/
https://security.gentoo.org/glsa/202208-34
https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html