Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tomcat10@10.1.6-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/tomcat10@10.1.6-1%2Bdeb12u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-5781-s1ny-q7ey CVE-2023-44487
GHSA-2m7v-gc89-fjqf
GHSA-qppj-fm5r-hxr3
GHSA-vx74-f528-fxqg
GHSA-xpw8-rcwv-8f8p
GMS-2023-3377
VSV00013
VCID-j6cj-ftyd-3ffa URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. Older, EOL versions may also be affected. The vulnerability is limited to the ROOT (default) web application. CVE-2023-41080
GHSA-q3mw-pvr8-9ggc
VCID-n9yk-e49f-n7e7 Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. CVE-2023-42795
GHSA-g8pj-r55q-5c2v
VCID-rzj2-4kcj-43dq Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue. CVE-2023-45648
GHSA-r6j3-px5g-cq3x
VCID-xgr8-tpv5-q3b2 The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. CVE-2023-28709
GHSA-cx6h-86xw-9x34

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:24:30.151630+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:11:35.308910+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:41.617094+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:22.335696+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:02.117338+00:00 Debian Importer Fixing VCID-xgr8-tpv5-q3b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:59:31.945807+00:00 Debian Importer Fixing VCID-xgr8-tpv5-q3b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:38.867351+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:45.860943+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:21.070115+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:50.885920+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:20.955961+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:20.909296+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:20.862153+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:20.774953+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:20.679750+00:00 Debian Importer Fixing VCID-xgr8-tpv5-q3b2 https://security-tracker.debian.org/tracker/data/json 38.1.0