Search for packages
| purl | pkg:deb/debian/tomcat10@10.1.6-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-v7tp-1t4h-zqeg | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected. |
CVE-2023-28708
GHSA-2c9m-w27f-53rm |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T11:06:09.298850+00:00 | Debian Importer | Fixing | VCID-v7tp-1t4h-zqeg | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-13T07:58:27.208425+00:00 | Debian Importer | Fixing | VCID-v7tp-1t4h-zqeg | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-03T07:55:20.638381+00:00 | Debian Importer | Fixing | VCID-v7tp-1t4h-zqeg | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |