Search for packages
| purl | pkg:apache/tomcat@11.0.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-56jv-htmt-rkew
Aliases: CVE-2023-24998 GHSA-hfrx-6qgj-fp6c |
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. | There are no reported fixed by versions. |
|
VCID-5732-xnx7-tkfy
Aliases: CVE-2023-34981 GHSA-mppv-79ch-vw6q |
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. | There are no reported fixed by versions. |
|
VCID-s24s-sbsx-b3f5
Aliases: CVE-2024-52318 GHSA-f632-9449-3j4w |
Incorrect object recycling and reuse vulnerability in Apache Tomcat. This issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96. Users are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue. |
Affected by 3 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-8mns-kw6c-a7dk | Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue. |
CVE-2024-52316
GHSA-xcpr-7mr4-h4xq |
| VCID-9qgr-t27j-y7d3 | Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. |
CVE-2024-52317
GHSA-qvf5-hvjx-wm27 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:38:04.642292+00:00 | Apache Tomcat Importer | Affected by | VCID-56jv-htmt-rkew | https://tomcat.apache.org/security-11.html | 38.0.0 |
| 2026-04-01T12:38:04.553428+00:00 | Apache Tomcat Importer | Affected by | VCID-5732-xnx7-tkfy | https://tomcat.apache.org/security-11.html | 38.0.0 |
| 2026-04-01T12:38:04.240970+00:00 | Apache Tomcat Importer | Fixing | VCID-8mns-kw6c-a7dk | https://tomcat.apache.org/security-11.html | 38.0.0 |
| 2026-04-01T12:38:04.209393+00:00 | Apache Tomcat Importer | Fixing | VCID-9qgr-t27j-y7d3 | https://tomcat.apache.org/security-11.html | 38.0.0 |
| 2026-04-01T12:38:04.177638+00:00 | Apache Tomcat Importer | Affected by | VCID-s24s-sbsx-b3f5 | https://tomcat.apache.org/security-11.html | 38.0.0 |