Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apache/tomcat@6.0.0
purl pkg:apache/tomcat@6.0.0
Next non-vulnerable version 6.0.6
Latest non-vulnerable version 11.0.21
Risk 10.0
Vulnerabilities affecting this package (64)
Vulnerability Summary Fixed by
VCID-18q4-zark-s7a7
Aliases:
CVE-2016-6794
GHSA-2rvf-329f-p99g
When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
6.0.47
Affected by 2 other vulnerabilities.
7.0.72
Affected by 2 other vulnerabilities.
8.0.37
Affected by 0 other vulnerabilities.
8.5.5
Affected by 1 other vulnerability.
9.0.0+M10
Affected by 0 other vulnerabilities.
VCID-1k8f-vsg1-k3d6
Aliases:
CVE-2016-0706
GHSA-6vx3-hr43-cfrh
Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.
6.0.45
Affected by 5 other vulnerabilities.
7.0.68
Affected by 0 other vulnerabilities.
8.0.32
Affected by 0 other vulnerabilities.
9.0.0+M3
Affected by 0 other vulnerabilities.
VCID-1qt3-ctae-sfgw
Aliases:
CVE-2009-2693
GHSA-ggx9-4728-588r
Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.
6.0.24
Affected by 0 other vulnerabilities.
VCID-241m-q6vd-kudk
Aliases:
CVE-2011-2526
GHSA-9ggm-7897-x4mg
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
6.0.33
Affected by 4 other vulnerabilities.
7.0.19
Affected by 1 other vulnerability.
VCID-27q8-96un-9fbk
Aliases:
CVE-2007-1355
GHSA-4c6x-gfc8-c26r
Multiple cross-site scripting (XSS) vulnerabilities in the appdev/sample/web/hello.jsp example application in Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.23, and 6.0.0 through 6.0.10 allow remote attackers to inject arbitrary web script or HTML via the test parameter and unspecified vectors.
6.0.11
Affected by 0 other vulnerabilities.
VCID-3cr9-g81m-4ugy
Aliases:
CVE-2016-5018
GHSA-4v3g-g84w-hv7r
In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
6.0.47
Affected by 2 other vulnerabilities.
7.0.72
Affected by 2 other vulnerabilities.
8.0.37
Affected by 0 other vulnerabilities.
8.5.5
Affected by 1 other vulnerability.
9.0.0+M10
Affected by 0 other vulnerabilities.
VCID-3n4t-bvb1-5qer
Aliases:
CVE-2016-6796
GHSA-3mjp-p938-4329
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
6.0.47
Affected by 2 other vulnerabilities.
7.0.72
Affected by 2 other vulnerabilities.
8.0.37
Affected by 0 other vulnerabilities.
8.5.5
Affected by 1 other vulnerability.
9.0.0+M10
Affected by 0 other vulnerabilities.
VCID-3r3s-q21j-c3au
Aliases:
CVE-2016-6816
GHSA-jc7p-5r39-9477
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
6.0.48
Affected by 1 other vulnerability.
7.0.73
Affected by 1 other vulnerability.
8.0.39
Affected by 1 other vulnerability.
8.5.8
Affected by 1 other vulnerability.
9.0.0+M13
Affected by 1 other vulnerability.
VCID-4mkw-7haq-pkgn
Aliases:
CVE-2014-0230
GHSA-pxcx-cxq8-4mmw
Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.
6.0.44
Affected by 4 other vulnerabilities.
7.0.55
Affected by 0 other vulnerabilities.
8.0.9
Affected by 0 other vulnerabilities.
VCID-4rcx-xfn5-7kdb
Aliases:
CVE-2009-0580
GHSA-w227-xcfx-3pj8
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
6.0.20
Affected by 4 other vulnerabilities.
VCID-68fk-4g86-ekbp
Aliases:
CVE-2015-5345
GHSA-rh8q-vjgf-gf74
The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.
6.0.45
Affected by 5 other vulnerabilities.
7.0.68
Affected by 0 other vulnerabilities.
8.0.30
Affected by 5 other vulnerabilities.
9.0.0+M3
Affected by 0 other vulnerabilities.
VCID-6epr-2hbd-skcz
Aliases:
CVE-2005-2090
GHSA-f2gq-p6qv-ccw4
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
6.0.11
Affected by 0 other vulnerabilities.
VCID-6p3e-4u8s-17ep
Aliases:
CVE-2007-3385
GHSA-6j8f-66vh-39mj
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
6.0.14
Affected by 2 other vulnerabilities.
VCID-7969-7a8h-zyhh
Aliases:
CVE-2007-3382
GHSA-qff8-g48j-pwpw
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
6.0.14
Affected by 2 other vulnerabilities.
VCID-7cpu-h5fr-8ffd
Aliases:
CVE-2014-7810
GHSA-4c43-cwvx-9crh
The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation.
6.0.44
Affected by 4 other vulnerabilities.
7.0.59
Affected by 0 other vulnerabilities.
8.0.17
Affected by 0 other vulnerabilities.
VCID-7ej8-5f77-cybb
Aliases:
CVE-2011-0534
GHSA-43v2-6grp-9pp9
Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.
6.0.32
Affected by 4 other vulnerabilities.
7.0.8
Affected by 0 other vulnerabilities.
VCID-7kjm-p97s-zuh8
Aliases:
CVE-2010-1157
GHSA-w6q7-ww2x-7gm3
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
6.0.28
Affected by 0 other vulnerabilities.
VCID-7pd9-1r19-73fe
Aliases:
CVE-2007-6286
GHSA-qrj4-rmqg-4hcp
Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.
6.0.16
Affected by 4 other vulnerabilities.
VCID-87p8-zvvf-y7dm
Aliases:
CVE-2007-0450
GHSA-4prh-gqw8-rgh5
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
6.0.10
Affected by 2 other vulnerabilities.
VCID-88v7-kc2y-bfd7
Aliases:
CVE-2007-5461
GHSA-v5p2-vg3c-pmrr
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
6.0.16
Affected by 4 other vulnerabilities.
VCID-95d1-arxd-hkd1
Aliases:
CVE-2016-8735
GHSA-cw54-59pw-4g8c
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
6.0.48
Affected by 1 other vulnerability.
7.0.73
Affected by 1 other vulnerability.
8.0.39
Affected by 1 other vulnerability.
8.5.8
Affected by 1 other vulnerability.
9.0.0+M13
Affected by 1 other vulnerability.
VCID-a1by-zvtm-akdc
Aliases:
CVE-2014-0227
GHSA-42j3-498q-m6vp
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
6.0.43
Affected by 2 other vulnerabilities.
7.0.55
Affected by 0 other vulnerabilities.
8.0.9
Affected by 0 other vulnerabilities.
VCID-a9cu-fxqw-xkdg
Aliases:
CVE-2008-1232
GHSA-q74x-qqhr-f8rx
Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
6.0.18
Affected by 5 other vulnerabilities.
VCID-acmu-9eqb-fya5
Aliases:
CVE-2008-2370
GHSA-m8h8-6rvg-f4mg
Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
6.0.18
Affected by 5 other vulnerabilities.
VCID-bung-pa58-ayfv
Aliases:
CVE-2009-0781
GHSA-j788-fx57-99wp
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
6.0.20
Affected by 4 other vulnerabilities.
VCID-d9ys-kxh6-nkgr
Aliases:
CVE-2011-1184
GHSA-q9xf-jwr4-v445
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.
6.0.33
Affected by 4 other vulnerabilities.
7.0.12
Affected by 1 other vulnerability.
VCID-dcrp-rae1-zfcm
Aliases:
CVE-2009-0033
GHSA-5cw4-ggx9-36vg
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
6.0.20
Affected by 4 other vulnerabilities.
VCID-dhun-hj5q-dfch
Aliases:
CVE-2011-0013
GHSA-3p86-xgrq-m6p6
Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
6.0.30
Affected by 4 other vulnerabilities.
7.0.6
Affected by 1 other vulnerability.
VCID-egup-27ub-6uaf
Aliases:
CVE-2008-1947
GHSA-f98p-9pp6-7q6c
Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.
6.0.18
Affected by 5 other vulnerabilities.
VCID-f2zy-gq57-ufat
Aliases:
CVE-2010-2227
GHSA-cxg2-49rq-8gcr
Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
6.0.28
Affected by 0 other vulnerabilities.
7.0.2
Affected by 0 other vulnerabilities.
VCID-fpuc-fe6m-47c6
Aliases:
CVE-2012-3546
GHSA-jgm2-m5cg-f66g
org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.
6.0.36
Affected by 2 other vulnerabilities.
7.0.30
Affected by 0 other vulnerabilities.
VCID-g998-xymt-fudu
Aliases:
CVE-2009-2901
GHSA-hjfh-7c4v-7q8h
The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
6.0.24
Affected by 0 other vulnerabilities.
VCID-h9ds-trhx-m7aj
Aliases:
CVE-2013-4286
GHSA-j448-j653-r3vj
Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.
6.0.39
Affected by 4 other vulnerabilities.
7.0.47
Affected by 2 other vulnerabilities.
8.0.0-RC3
Affected by 0 other vulnerabilities.
VCID-hhk9-cr54-8fgc
Aliases:
CVE-2012-0022
GHSA-8h2q-qm9x-55jc
Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.
6.0.35
Affected by 5 other vulnerabilities.
7.0.23
Affected by 1 other vulnerability.
VCID-hhkg-mfp5-2kax
Aliases:
CVE-2007-5342
GHSA-w65j-cmqc-37p2
The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.
6.0.16
Affected by 4 other vulnerabilities.
VCID-jf7u-dvpd-b7f4
Aliases:
CVE-2014-0119
GHSA-prc3-7f44-w48j
Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.
6.0.41
Affected by 1 other vulnerability.
7.0.54
Affected by 2 other vulnerabilities.
8.0.8
Affected by 2 other vulnerabilities.
VCID-kagr-74d9-kyhx
Aliases:
CVE-2016-0762
GHSA-wxcp-f2c8-x6xv
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
6.0.47
Affected by 2 other vulnerabilities.
7.0.72
Affected by 2 other vulnerabilities.
8.0.37
Affected by 0 other vulnerabilities.
8.5.5
Affected by 1 other vulnerability.
9.0.0+M10
Affected by 0 other vulnerabilities.
VCID-kgd1-bzst-muh7
Aliases:
CVE-2014-0096
GHSA-qprx-q2r7-3rx6
java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
6.0.41
Affected by 1 other vulnerability.
7.0.53
Affected by 1 other vulnerability.
8.0.5
Affected by 1 other vulnerability.
VCID-kzzv-rhya-j7dd
Aliases:
CVE-2014-0075
GHSA-475f-74wp-pqv5
Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
6.0.41
Affected by 1 other vulnerability.
7.0.53
Affected by 1 other vulnerability.
8.0.5
Affected by 1 other vulnerability.
VCID-m1zd-uytj-3bej
Aliases:
CVE-2017-5647
GHSA-3gv7-3h64-78cm
A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.
6.0.53
Affected by 0 other vulnerabilities.
7.0.77
Affected by 1 other vulnerability.
8.0.43
Affected by 1 other vulnerability.
8.5.13
Affected by 0 other vulnerabilities.
9.0.0+M19
Affected by 0 other vulnerabilities.
VCID-mctd-9zgv-5qgp
Aliases:
CVE-2011-2204
GHSA-c57p-3v2g-w9rg
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
6.0.33
Affected by 4 other vulnerabilities.
7.0.19
Affected by 1 other vulnerability.
VCID-mnf8-t3ew-4fgb
Aliases:
CVE-2008-5515
GHSA-9737-qmgc-hfr9
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
6.0.20
Affected by 4 other vulnerabilities.
VCID-mwk8-b5c9-kbb9
Aliases:
CVE-2012-4534
org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.
6.0.36
Affected by 2 other vulnerabilities.
7.0.28
Affected by 1 other vulnerability.
VCID-n76n-ywja-rbhh
Aliases:
CVE-2012-3439
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-5885, CVE-2012-5886, CVE-2012-5887. Reason: This candidate is a duplicate of CVE-2012-5885, CVE-2012-5886, and CVE-2012-5887. Notes: All CVE users should reference one or more of CVE-2012-5885, CVE-2012-5886, and CVE-2012-5887 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
6.0.36
Affected by 2 other vulnerabilities.
7.0.30
Affected by 0 other vulnerabilities.
VCID-p4dn-y54m-8fd1
Aliases:
CVE-2012-3544
GHSA-qfxv-3ppc-7qg5
Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
6.0.37
Affected by 5 other vulnerabilities.
7.0.30
Affected by 0 other vulnerabilities.
VCID-p6ch-pc73-b3ck
Aliases:
CVE-2015-5174
GHSA-6qr6-x7jm-x2q6
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
6.0.45
Affected by 5 other vulnerabilities.
7.0.65
Affected by 1 other vulnerability.
8.0.27
Affected by 0 other vulnerabilities.
VCID-peya-mr7j-vugf
Aliases:
CVE-2007-2449
GHSA-hc39-rjwp-qffq
Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
6.0.14
Affected by 2 other vulnerabilities.
VCID-qdck-q54n-rkcv
Aliases:
CVE-2008-0128
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
6.0.9
Affected by 1 other vulnerability.
VCID-quwu-ep21-cyew
Aliases:
CVE-2011-3190
GHSA-c38m-v4m2-524v
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
6.0.35
Affected by 5 other vulnerabilities.
7.0.21
Affected by 2 other vulnerabilities.
VCID-qxkf-4ddv-j3b7
Aliases:
CVE-2007-1358
GHSA-xmc9-6p56-3c4v
Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
6.0.6
Affected by 0 other vulnerabilities.
VCID-r84b-7ay9-ekcm
Aliases:
CVE-2009-0783
GHSA-hhjg-g8xq-hhr3
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
6.0.20
Affected by 4 other vulnerabilities.
VCID-su1y-2bxh-9qe2
Aliases:
CVE-2007-3386
Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.
6.0.14
Affected by 2 other vulnerabilities.
VCID-tcbc-3kgt-muam
Aliases:
CVE-2013-4322
GHSA-wq2p-q66w-q8gp
Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.
6.0.39
Affected by 4 other vulnerabilities.
7.0.50
Affected by 1 other vulnerability.
8.0.0-RC10
Affected by 0 other vulnerabilities.
VCID-tcju-3rvu-wkht
Aliases:
CVE-2007-2450
GHSA-5c5p-jxvx-x7j2
Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
6.0.14
Affected by 2 other vulnerabilities.
VCID-tfn5-6ckq-wyce
Aliases:
CVE-2010-3718
GHSA-fj6c-prgj-gr3r
Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
6.0.30
Affected by 4 other vulnerabilities.
7.0.4
Affected by 1 other vulnerability.
VCID-tfrs-d458-tfaq
Aliases:
CVE-2016-0714
GHSA-mv42-px54-87jw
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
6.0.45
Affected by 5 other vulnerabilities.
7.0.68
Affected by 0 other vulnerabilities.
8.0.32
Affected by 0 other vulnerabilities.
9.0.0+M3
Affected by 0 other vulnerabilities.
VCID-twh8-87va-juf9
Aliases:
CVE-2013-1571
Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
6.0.39
Affected by 4 other vulnerabilities.
VCID-v94p-bxm3-akfd
Aliases:
CVE-2007-5333
GHSA-cww4-vj5r-rx57
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
6.0.16
Affected by 4 other vulnerabilities.
VCID-vd1s-m27a-8ucc
Aliases:
CVE-2012-2733
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
6.0.36
Affected by 2 other vulnerabilities.
7.0.28
Affected by 1 other vulnerability.
VCID-vm4b-26sq-tfev
Aliases:
CVE-2009-3548
The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
6.0.24
Affected by 0 other vulnerabilities.
VCID-w82a-7kk2-p3f1
Aliases:
CVE-2013-4590
GHSA-87w9-x2c3-hrjj
Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
6.0.39
Affected by 4 other vulnerabilities.
7.0.50
Affected by 1 other vulnerability.
8.0.0-RC10
Affected by 0 other vulnerabilities.
VCID-wsn2-pd9b-b3g8
Aliases:
CVE-2009-2902
GHSA-8wch-9gcg-v2pr
Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
6.0.24
Affected by 0 other vulnerabilities.
VCID-xf8r-kqxb-7qdy
Aliases:
CVE-2016-6797
GHSA-q6x7-f33r-3wxx
The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.
6.0.47
Affected by 2 other vulnerabilities.
7.0.72
Affected by 2 other vulnerabilities.
8.0.37
Affected by 0 other vulnerabilities.
8.5.5
Affected by 1 other vulnerability.
9.0.0+M10
Affected by 0 other vulnerabilities.
VCID-ygvw-69am-s7ae
Aliases:
CVE-2014-0099
GHSA-xh5x-j8jf-pcpx
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
6.0.41
Affected by 1 other vulnerability.
7.0.53
Affected by 1 other vulnerability.
8.0.5
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:38:18.087319+00:00 Apache Tomcat Importer Affected by VCID-qxkf-4ddv-j3b7 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:18.055790+00:00 Apache Tomcat Importer Affected by VCID-qdck-q54n-rkcv https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:18.026280+00:00 Apache Tomcat Importer Affected by VCID-87p8-zvvf-y7dm https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:18.000049+00:00 Apache Tomcat Importer Affected by VCID-6epr-2hbd-skcz https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.971095+00:00 Apache Tomcat Importer Affected by VCID-27q8-96un-9fbk https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.940736+00:00 Apache Tomcat Importer Affected by VCID-su1y-2bxh-9qe2 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.913176+00:00 Apache Tomcat Importer Affected by VCID-6p3e-4u8s-17ep https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.882390+00:00 Apache Tomcat Importer Affected by VCID-7969-7a8h-zyhh https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.852367+00:00 Apache Tomcat Importer Affected by VCID-tcju-3rvu-wkht https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.822072+00:00 Apache Tomcat Importer Affected by VCID-peya-mr7j-vugf https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.765398+00:00 Apache Tomcat Importer Affected by VCID-7pd9-1r19-73fe https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.735969+00:00 Apache Tomcat Importer Affected by VCID-88v7-kc2y-bfd7 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.705747+00:00 Apache Tomcat Importer Affected by VCID-hhkg-mfp5-2kax https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.676608+00:00 Apache Tomcat Importer Affected by VCID-v94p-bxm3-akfd https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.645660+00:00 Apache Tomcat Importer Affected by VCID-acmu-9eqb-fya5 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.615311+00:00 Apache Tomcat Importer Affected by VCID-egup-27ub-6uaf https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.585414+00:00 Apache Tomcat Importer Affected by VCID-a9cu-fxqw-xkdg https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.553484+00:00 Apache Tomcat Importer Affected by VCID-r84b-7ay9-ekcm https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.521424+00:00 Apache Tomcat Importer Affected by VCID-bung-pa58-ayfv https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.490041+00:00 Apache Tomcat Importer Affected by VCID-4rcx-xfn5-7kdb https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.457806+00:00 Apache Tomcat Importer Affected by VCID-dcrp-rae1-zfcm https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.425800+00:00 Apache Tomcat Importer Affected by VCID-mnf8-t3ew-4fgb https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.394599+00:00 Apache Tomcat Importer Affected by VCID-vm4b-26sq-tfev https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.366806+00:00 Apache Tomcat Importer Affected by VCID-wsn2-pd9b-b3g8 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.339486+00:00 Apache Tomcat Importer Affected by VCID-g998-xymt-fudu https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.308564+00:00 Apache Tomcat Importer Affected by VCID-1qt3-ctae-sfgw https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.281043+00:00 Apache Tomcat Importer Affected by VCID-7kjm-p97s-zuh8 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.248353+00:00 Apache Tomcat Importer Affected by VCID-f2zy-gq57-ufat https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.221638+00:00 Apache Tomcat Importer Affected by VCID-tfn5-6ckq-wyce https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.160976+00:00 Apache Tomcat Importer Affected by VCID-dhun-hj5q-dfch https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.132100+00:00 Apache Tomcat Importer Affected by VCID-7ej8-5f77-cybb https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.076522+00:00 Apache Tomcat Importer Affected by VCID-241m-q6vd-kudk https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.047266+00:00 Apache Tomcat Importer Affected by VCID-mctd-9zgv-5qgp https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.016889+00:00 Apache Tomcat Importer Affected by VCID-d9ys-kxh6-nkgr https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.987094+00:00 Apache Tomcat Importer Affected by VCID-hhk9-cr54-8fgc https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.955183+00:00 Apache Tomcat Importer Affected by VCID-quwu-ep21-cyew https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.900154+00:00 Apache Tomcat Importer Affected by VCID-mwk8-b5c9-kbb9 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.844815+00:00 Apache Tomcat Importer Affected by VCID-fpuc-fe6m-47c6 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.817623+00:00 Apache Tomcat Importer Affected by VCID-n76n-ywja-rbhh https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.785612+00:00 Apache Tomcat Importer Affected by VCID-vd1s-m27a-8ucc https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.758114+00:00 Apache Tomcat Importer Affected by VCID-p4dn-y54m-8fd1 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.664475+00:00 Apache Tomcat Importer Affected by VCID-w82a-7kk2-p3f1 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.634520+00:00 Apache Tomcat Importer Affected by VCID-tcbc-3kgt-muam https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.606745+00:00 Apache Tomcat Importer Affected by VCID-h9ds-trhx-m7aj https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.574516+00:00 Apache Tomcat Importer Affected by VCID-twh8-87va-juf9 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.544375+00:00 Apache Tomcat Importer Affected by VCID-jf7u-dvpd-b7f4 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.513094+00:00 Apache Tomcat Importer Affected by VCID-ygvw-69am-s7ae https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.482306+00:00 Apache Tomcat Importer Affected by VCID-kgd1-bzst-muh7 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.452152+00:00 Apache Tomcat Importer Affected by VCID-kzzv-rhya-j7dd https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.424224+00:00 Apache Tomcat Importer Affected by VCID-a1by-zvtm-akdc https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.393930+00:00 Apache Tomcat Importer Affected by VCID-7cpu-h5fr-8ffd https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.361607+00:00 Apache Tomcat Importer Affected by VCID-4mkw-7haq-pkgn https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.329697+00:00 Apache Tomcat Importer Affected by VCID-tfrs-d458-tfaq https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.301422+00:00 Apache Tomcat Importer Affected by VCID-1k8f-vsg1-k3d6 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.272681+00:00 Apache Tomcat Importer Affected by VCID-68fk-4g86-ekbp https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.241669+00:00 Apache Tomcat Importer Affected by VCID-p6ch-pc73-b3ck https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.210571+00:00 Apache Tomcat Importer Affected by VCID-kagr-74d9-kyhx https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.178796+00:00 Apache Tomcat Importer Affected by VCID-3cr9-g81m-4ugy https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.148987+00:00 Apache Tomcat Importer Affected by VCID-18q4-zark-s7a7 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.119993+00:00 Apache Tomcat Importer Affected by VCID-3n4t-bvb1-5qer https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.089437+00:00 Apache Tomcat Importer Affected by VCID-xf8r-kqxb-7qdy https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.062056+00:00 Apache Tomcat Importer Affected by VCID-3r3s-q21j-c3au https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.033769+00:00 Apache Tomcat Importer Affected by VCID-95d1-arxd-hkd1 https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:15.961116+00:00 Apache Tomcat Importer Affected by VCID-m1zd-uytj-3bej https://tomcat.apache.org/security-6.html 38.0.0