Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat-coyote@11.0.0-M1
purl pkg:maven/org.apache.tomcat/tomcat-coyote@11.0.0-M1
Next non-vulnerable version 11.0.0-M5
Latest non-vulnerable version 11.0.20
Risk 10.0
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-1e6p-cppr-2bh2
Aliases:
CVE-2025-48989
GHSA-gqp3-2cvr-x8m3
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.
11.0.10
Affected by 0 other vulnerabilities.
VCID-5781-s1ny-q7ey
Aliases:
CVE-2023-44487
GHSA-2m7v-gc89-fjqf
GHSA-qppj-fm5r-hxr3
GHSA-vx74-f528-fxqg
GHSA-xpw8-rcwv-8f8p
GMS-2023-3377
VSV00013
11.0.0-M12
Affected by 0 other vulnerabilities.
VCID-8myk-ac5b-huh8
Aliases:
CVE-2024-34750
GHSA-wm9w-rjj3-j356
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
11.0.0-M21
Affected by 0 other vulnerabilities.
VCID-8war-4v58-eub2
Aliases:
CVE-2026-24734
GHSA-mgp5-rv84-w37q
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
11.0.18
Affected by 1 other vulnerability.
VCID-fpgj-82wf-ykbw
Aliases:
CVE-2025-53506
GHSA-25xr-qj8w-c4vf
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
11.0.9
Affected by 0 other vulnerabilities.
VCID-n9yk-e49f-n7e7
Aliases:
CVE-2023-42795
GHSA-g8pj-r55q-5c2v
Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
11.0.0-M12
Affected by 0 other vulnerabilities.
VCID-vsdf-4tfj-uybe
Aliases:
CVE-2024-24549
GHSA-7w75-32cg-r6g2
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
11.0.0-M17
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-07T04:58:26.017683+00:00 GHSA Importer Affected by VCID-1e6p-cppr-2bh2 https://github.com/advisories/GHSA-gqp3-2cvr-x8m3 38.1.0
2026-04-07T04:58:11.710280+00:00 GHSA Importer Affected by VCID-fpgj-82wf-ykbw https://github.com/advisories/GHSA-25xr-qj8w-c4vf 38.1.0
2026-04-02T17:00:27.096354+00:00 GHSA Importer Affected by VCID-5781-s1ny-q7ey https://github.com/advisories/GHSA-qppj-fm5r-hxr3 38.1.0
2026-04-02T17:00:23.648062+00:00 GHSA Importer Affected by VCID-n9yk-e49f-n7e7 https://github.com/advisories/GHSA-g8pj-r55q-5c2v 38.1.0
2026-04-01T16:07:59.954329+00:00 GHSA Importer Affected by VCID-8war-4v58-eub2 https://github.com/advisories/GHSA-mgp5-rv84-w37q 38.0.0
2026-04-01T16:05:57.292109+00:00 GHSA Importer Affected by VCID-8myk-ac5b-huh8 https://github.com/advisories/GHSA-wm9w-rjj3-j356 38.0.0
2026-04-01T16:04:50.206834+00:00 GHSA Importer Affected by VCID-vsdf-4tfj-uybe https://github.com/advisories/GHSA-7w75-32cg-r6g2 38.0.0