Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tomcat10@10.1.6-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/tomcat10@10.1.6-1%2Bdeb12u2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-b3bb-9ajg-sfc9 Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue. CVE-2023-46589
GHSA-fccv-jmmp-qg76
VCID-p6pa-f1fg-hbhg Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. CVE-2024-23672
GHSA-v682-8vv8-vpwr
VCID-vsdf-4tfj-uybe Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. CVE-2024-24549
GHSA-7w75-32cg-r6g2

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:17:06.020967+00:00 Debian Importer Fixing VCID-vsdf-4tfj-uybe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:22.419449+00:00 Debian Importer Fixing VCID-p6pa-f1fg-hbhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:31.646463+00:00 Debian Importer Fixing VCID-b3bb-9ajg-sfc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:24:04.443884+00:00 Debian Importer Fixing VCID-vsdf-4tfj-uybe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:31.705763+00:00 Debian Importer Fixing VCID-p6pa-f1fg-hbhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:53.234797+00:00 Debian Importer Fixing VCID-b3bb-9ajg-sfc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:21.169204+00:00 Debian Importer Fixing VCID-vsdf-4tfj-uybe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:21.109929+00:00 Debian Importer Fixing VCID-p6pa-f1fg-hbhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:21.009473+00:00 Debian Importer Fixing VCID-b3bb-9ajg-sfc9 https://security-tracker.debian.org/tracker/data/json 38.1.0