Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat-coyote@10.1.0-M1
purl pkg:maven/org.apache.tomcat/tomcat-coyote@10.1.0-M1
Next non-vulnerable version 10.1.16
Latest non-vulnerable version 11.0.20
Risk 4.0
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-1e6p-cppr-2bh2
Aliases:
CVE-2025-48989
GHSA-gqp3-2cvr-x8m3
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.
10.1.44
Affected by 0 other vulnerabilities.
11.0.10
Affected by 0 other vulnerabilities.
VCID-56jv-htmt-rkew
Aliases:
CVE-2023-24998
GHSA-hfrx-6qgj-fp6c
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
10.1.5
Affected by 2 other vulnerabilities.
11.0.0-M5
Affected by 0 other vulnerabilities.
VCID-8myk-ac5b-huh8
Aliases:
CVE-2024-34750
GHSA-wm9w-rjj3-j356
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
10.1.25
Affected by 0 other vulnerabilities.
11.0.0-M21
Affected by 0 other vulnerabilities.
VCID-fpgj-82wf-ykbw
Aliases:
CVE-2025-53506
GHSA-25xr-qj8w-c4vf
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
10.1.43
Affected by 0 other vulnerabilities.
11.0.9
Affected by 0 other vulnerabilities.
VCID-n9yk-e49f-n7e7
Aliases:
CVE-2023-42795
GHSA-g8pj-r55q-5c2v
Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
10.1.14
Affected by 1 other vulnerability.
11.0.0-M12
Affected by 0 other vulnerabilities.
VCID-nmq2-8ysj-4fbc
Aliases:
CVE-2022-42252
GHSA-p22x-g9px-3945
If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.
10.1.1
Affected by 2 other vulnerabilities.
VCID-vsdf-4tfj-uybe
Aliases:
CVE-2024-24549
GHSA-7w75-32cg-r6g2
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
10.1.19
Affected by 0 other vulnerabilities.
11.0.0-M17
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-07T04:58:26.194621+00:00 GHSA Importer Affected by VCID-1e6p-cppr-2bh2 https://github.com/advisories/GHSA-gqp3-2cvr-x8m3 38.1.0
2026-04-07T04:58:11.500168+00:00 GHSA Importer Affected by VCID-fpgj-82wf-ykbw https://github.com/advisories/GHSA-25xr-qj8w-c4vf 38.1.0
2026-04-02T17:00:23.517333+00:00 GHSA Importer Affected by VCID-n9yk-e49f-n7e7 https://github.com/advisories/GHSA-g8pj-r55q-5c2v 38.1.0
2026-04-02T16:58:59.064946+00:00 GHSA Importer Affected by VCID-56jv-htmt-rkew https://github.com/advisories/GHSA-hfrx-6qgj-fp6c 38.1.0
2026-04-01T16:05:57.255415+00:00 GHSA Importer Affected by VCID-8myk-ac5b-huh8 https://github.com/advisories/GHSA-wm9w-rjj3-j356 38.0.0
2026-04-01T16:04:49.990738+00:00 GHSA Importer Affected by VCID-vsdf-4tfj-uybe https://github.com/advisories/GHSA-7w75-32cg-r6g2 38.0.0
2026-04-01T16:03:55.761601+00:00 GHSA Importer Affected by VCID-nmq2-8ysj-4fbc https://github.com/advisories/GHSA-p22x-g9px-3945 38.0.0