Search for packages
| purl | pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@11.0.0-M2 |
| Tags | Ghost |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2zq1-na8s-mfdd
Aliases: CVE-2025-31650 GHSA-3p2h-wqq4-wf4h |
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.90 though 8.5.100. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue. |
Affected by 1 other vulnerability. |
|
VCID-56jv-htmt-rkew
Aliases: CVE-2023-24998 GHSA-hfrx-6qgj-fp6c |
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. |
Affected by 5 other vulnerabilities. |
|
VCID-kukv-k3z7-7fgs
Aliases: CVE-2025-31651 GHSA-ff77-26x5-69cr |
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue. |
Affected by 1 other vulnerability. |
|
VCID-xgr8-tpv5-q3b2
Aliases: CVE-2023-28709 GHSA-cx6h-86xw-9x34 |
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. |
Affected by 5 other vulnerabilities. Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-07T04:57:42.282935+00:00 | GHSA Importer | Affected by | VCID-2zq1-na8s-mfdd | https://github.com/advisories/GHSA-3p2h-wqq4-wf4h | 38.1.0 |
| 2026-04-07T04:57:42.020188+00:00 | GHSA Importer | Affected by | VCID-kukv-k3z7-7fgs | https://github.com/advisories/GHSA-ff77-26x5-69cr | 38.1.0 |
| 2026-04-02T16:59:51.041979+00:00 | GHSA Importer | Affected by | VCID-xgr8-tpv5-q3b2 | https://github.com/advisories/GHSA-cx6h-86xw-9x34 | 38.1.0 |
| 2026-04-02T16:58:59.309714+00:00 | GHSA Importer | Affected by | VCID-56jv-htmt-rkew | https://github.com/advisories/GHSA-hfrx-6qgj-fp6c | 38.1.0 |