Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat-coyote@9.0.0.M1
purl pkg:maven/org.apache.tomcat/tomcat-coyote@9.0.0.M1
Next non-vulnerable version 9.0.86
Latest non-vulnerable version 11.0.20
Risk 10.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-1e6p-cppr-2bh2
Aliases:
CVE-2025-48989
GHSA-gqp3-2cvr-x8m3
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.
9.0.108
Affected by 0 other vulnerabilities.
10.1.44
Affected by 0 other vulnerabilities.
11.0.10
Affected by 0 other vulnerabilities.
VCID-1hdb-24e3-f3d6
Aliases:
CVE-2017-5651
GHSA-9hg2-395j-83rm
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up.
9.0.0.M19
Affected by 1 other vulnerability.
VCID-3r3s-q21j-c3au
Aliases:
CVE-2016-6816
GHSA-jc7p-5r39-9477
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
9.0.0.M12
Affected by 0 other vulnerabilities.
9.0.0.M13
Affected by 1 other vulnerability.
VCID-fpgj-82wf-ykbw
Aliases:
CVE-2025-53506
GHSA-25xr-qj8w-c4vf
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
9.0.107
Affected by 0 other vulnerabilities.
10.1.43
Affected by 0 other vulnerabilities.
11.0.9
Affected by 0 other vulnerabilities.
VCID-k9cg-ehdw-dbh6
Aliases:
CVE-2024-21733
GHSA-f4qf-m5gf-8jm8
Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Other, EOL versions may also be affected. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.
9.0.44
Affected by 6 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:48:19.395050+00:00 GitLab Importer Affected by VCID-k9cg-ehdw-dbh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2024-21733.yml 38.4.0
2026-04-16T21:47:27.724282+00:00 GitLab Importer Affected by VCID-3r3s-q21j-c3au https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2016-6816.yml 38.4.0
2026-04-12T00:08:07.870625+00:00 GitLab Importer Affected by VCID-k9cg-ehdw-dbh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2024-21733.yml 38.3.0
2026-04-11T23:03:17.978398+00:00 GitLab Importer Affected by VCID-3r3s-q21j-c3au https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2016-6816.yml 38.3.0
2026-04-07T04:58:26.272366+00:00 GHSA Importer Affected by VCID-1e6p-cppr-2bh2 https://github.com/advisories/GHSA-gqp3-2cvr-x8m3 38.1.0
2026-04-07T04:58:11.543510+00:00 GHSA Importer Affected by VCID-fpgj-82wf-ykbw https://github.com/advisories/GHSA-25xr-qj8w-c4vf 38.1.0
2026-04-04T14:29:59.393248+00:00 GHSA Importer Affected by VCID-1hdb-24e3-f3d6 https://github.com/advisories/GHSA-9hg2-395j-83rm 38.1.0
2026-04-03T00:12:47.131365+00:00 GitLab Importer Affected by VCID-k9cg-ehdw-dbh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2024-21733.yml 38.1.0
2026-04-02T23:11:40.748741+00:00 GitLab Importer Affected by VCID-3r3s-q21j-c3au https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2016-6816.yml 38.1.0
2026-04-01T16:01:20.000628+00:00 GHSA Importer Affected by VCID-3r3s-q21j-c3au https://github.com/advisories/GHSA-jc7p-5r39-9477 38.0.0
2026-04-01T12:50:07.403068+00:00 GitLab Importer Affected by VCID-3r3s-q21j-c3au https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2016-6816.yml 38.0.0