Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apache/tomcat@6.0.33
purl pkg:apache/tomcat@6.0.33
Next non-vulnerable version 6.0.50
Latest non-vulnerable version 11.0.21
Risk 4.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-a9bd-d31y-k7g6
Aliases:
CVE-2014-0033
GHSA-6gjj-c5mj-4cvp
org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL.
6.0.39
Affected by 4 other vulnerabilities.
VCID-hhk9-cr54-8fgc
Aliases:
CVE-2012-0022
GHSA-8h2q-qm9x-55jc
Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.
6.0.35
Affected by 5 other vulnerabilities.
7.0.23
Affected by 1 other vulnerability.
VCID-hxj6-mupf-abbc
Aliases:
CVE-2011-3375
GHSA-rp8h-vr48-4j8p
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.
6.0.35
Affected by 5 other vulnerabilities.
7.0.22
Affected by 1 other vulnerability.
VCID-quwu-ep21-cyew
Aliases:
CVE-2011-3190
GHSA-c38m-v4m2-524v
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
6.0.35
Affected by 5 other vulnerabilities.
7.0.21
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-241m-q6vd-kudk Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application. CVE-2011-2526
GHSA-9ggm-7897-x4mg
VCID-618c-ar98-qfcr native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application. CVE-2011-2729
VCID-d9ys-kxh6-nkgr The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values. CVE-2011-1184
GHSA-q9xf-jwr4-v445
VCID-mctd-9zgv-5qgp Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file. CVE-2011-2204
GHSA-c57p-3v2g-w9rg

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:38:17.111005+00:00 Apache Tomcat Importer Fixing VCID-618c-ar98-qfcr https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.080780+00:00 Apache Tomcat Importer Fixing VCID-241m-q6vd-kudk https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.051558+00:00 Apache Tomcat Importer Fixing VCID-mctd-9zgv-5qgp https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:17.021651+00:00 Apache Tomcat Importer Fixing VCID-d9ys-kxh6-nkgr https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.988835+00:00 Apache Tomcat Importer Affected by VCID-hhk9-cr54-8fgc https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.957045+00:00 Apache Tomcat Importer Affected by VCID-quwu-ep21-cyew https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.927856+00:00 Apache Tomcat Importer Affected by VCID-hxj6-mupf-abbc https://tomcat.apache.org/security-6.html 38.0.0
2026-04-01T12:38:16.695964+00:00 Apache Tomcat Importer Affected by VCID-a9bd-d31y-k7g6 https://tomcat.apache.org/security-6.html 38.0.0