Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apache/tomcat@11.0.0-M3
purl pkg:apache/tomcat@11.0.0-M3
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-56jv-htmt-rkew Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. CVE-2023-24998
GHSA-hfrx-6qgj-fp6c
VCID-v7tp-1t4h-zqeg When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected. CVE-2023-28708
GHSA-2c9m-w27f-53rm

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:38:04.644201+00:00 Apache Tomcat Importer Fixing VCID-56jv-htmt-rkew https://tomcat.apache.org/security-11.html 38.0.0
2026-04-01T12:38:04.615433+00:00 Apache Tomcat Importer Fixing VCID-v7tp-1t4h-zqeg https://tomcat.apache.org/security-11.html 38.0.0