Search for packages
| purl | pkg:apache/tomcat@5.5.35 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-n76n-ywja-rbhh
Aliases: CVE-2012-3439 |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-5885, CVE-2012-5886, CVE-2012-5887. Reason: This candidate is a duplicate of CVE-2012-5885, CVE-2012-5886, and CVE-2012-5887. Notes: All CVE users should reference one or more of CVE-2012-5885, CVE-2012-5886, and CVE-2012-5887 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. |
Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-hhk9-cr54-8fgc | Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. |
CVE-2012-0022
GHSA-8h2q-qm9x-55jc |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:38:18.150034+00:00 | Apache Tomcat Importer | Fixing | VCID-hhk9-cr54-8fgc | https://tomcat.apache.org/security-5.html | 38.0.0 |
| 2026-04-01T12:38:18.117002+00:00 | Apache Tomcat Importer | Affected by | VCID-n76n-ywja-rbhh | https://tomcat.apache.org/security-5.html | 38.0.0 |