Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tomcat9@9.0.43-2~deb11u7?distro=trixie
purl pkg:deb/debian/tomcat9@9.0.43-2~deb11u7?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-56jv-htmt-rkew Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. CVE-2023-24998
GHSA-hfrx-6qgj-fp6c
VCID-5781-s1ny-q7ey CVE-2023-44487
GHSA-2m7v-gc89-fjqf
GHSA-qppj-fm5r-hxr3
GHSA-vx74-f528-fxqg
GHSA-xpw8-rcwv-8f8p
GMS-2023-3377
VSV00013
VCID-j6cj-ftyd-3ffa URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. Older, EOL versions may also be affected. The vulnerability is limited to the ROOT (default) web application. CVE-2023-41080
GHSA-q3mw-pvr8-9ggc
VCID-n9yk-e49f-n7e7 Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. CVE-2023-42795
GHSA-g8pj-r55q-5c2v
VCID-rzj2-4kcj-43dq Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue. CVE-2023-45648
GHSA-r6j3-px5g-cq3x

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:28:46.443188+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:02:15.108391+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:12:34.311998+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:18.481970+00:00 Debian Importer Fixing VCID-56jv-htmt-rkew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:13.327110+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:18:05.544141+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:41.720685+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:06.326040+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:30.659236+00:00 Debian Importer Fixing VCID-56jv-htmt-rkew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:21.162092+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:55:25.782787+00:00 Debian Importer Fixing VCID-rzj2-4kcj-43dq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.742544+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.701784+00:00 Debian Importer Fixing VCID-n9yk-e49f-n7e7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.619430+00:00 Debian Importer Fixing VCID-j6cj-ftyd-3ffa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:55:25.455555+00:00 Debian Importer Fixing VCID-56jv-htmt-rkew https://security-tracker.debian.org/tracker/data/json 38.1.0