Search for packages
| purl | pkg:alpm/archlinux/tomcat9@9.0.37-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-46bv-6b7y-3bca | A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. |
CVE-2020-11996
GHSA-53hp-jpwq-2jgq |
| VCID-dzan-r49k-kqab | An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service. |
CVE-2020-13934
GHSA-vf77-8h7g-gghp |
| VCID-nvbx-q971-skgm | The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. |
CVE-2020-13935
GHSA-m7jv-hq7h-mq7c |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:26:59.888323+00:00 | Arch Linux Importer | Fixing | VCID-46bv-6b7y-3bca | https://security.archlinux.org/AVG-1196 | 38.0.0 |
| 2026-04-01T18:25:48.483430+00:00 | Arch Linux Importer | Fixing | VCID-dzan-r49k-kqab | https://security.archlinux.org/AVG-1205 | 38.0.0 |
| 2026-04-01T18:25:48.460887+00:00 | Arch Linux Importer | Fixing | VCID-nvbx-q971-skgm | https://security.archlinux.org/AVG-1205 | 38.0.0 |