Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apache/tomcat@6.0.11
purl pkg:apache/tomcat@6.0.11
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-27q8-96un-9fbk Multiple cross-site scripting (XSS) vulnerabilities in the appdev/sample/web/hello.jsp example application in Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.23, and 6.0.0 through 6.0.10 allow remote attackers to inject arbitrary web script or HTML via the test parameter and unspecified vectors. CVE-2007-1355
GHSA-4c6x-gfc8-c26r
VCID-6epr-2hbd-skcz Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling." CVE-2005-2090
GHSA-f2gq-p6qv-ccw4

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:38:18.004031+00:00 Apache Tomcat Importer Fixing VCID-6epr-2hbd-skcz https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.976086+00:00 Apache Tomcat Importer Fixing VCID-27q8-96un-9fbk https://tomcat.apache.org/security-6.html 38.0.0