Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat@9.0.0.M11
purl pkg:maven/org.apache.tomcat/tomcat@9.0.0.M11
Next non-vulnerable version 9.0.117
Latest non-vulnerable version 11.0.21
Risk 10.0
Vulnerabilities affecting this package (17)
Vulnerability Summary Fixed by
VCID-1hdb-24e3-f3d6
Aliases:
CVE-2017-5651
GHSA-9hg2-395j-83rm
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up.
9.0.0.M19
Affected by 8 other vulnerabilities.
VCID-3r3s-q21j-c3au
Aliases:
CVE-2016-6816
GHSA-jc7p-5r39-9477
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
9.0.0.M12
Affected by 0 other vulnerabilities.
9.0.0.M13
Affected by 14 other vulnerabilities.
VCID-4tf3-7f5b-2ffu
Aliases:
CVE-2017-7675
GHSA-68g5-8q7f-m384
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.
9.0.0.M22
Affected by 7 other vulnerabilities.
VCID-6wvu-2rmc-mfhj
Aliases:
CVE-2016-8747
GHSA-fjwp-r6fm-q6qw
An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be associated with a different request.
9.0.0.M16
Affected by 0 other vulnerabilities.
9.0.0.M17
Affected by 12 other vulnerabilities.
VCID-95d1-arxd-hkd1
Aliases:
CVE-2016-8735
GHSA-cw54-59pw-4g8c
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
9.0.0.M12
Affected by 0 other vulnerabilities.
9.0.0.M13
Affected by 14 other vulnerabilities.
VCID-ayrd-8ntf-hkh3
Aliases:
CVE-2022-25762
GHSA-h3ch-5pp2-vh6w
If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.
9.0.20
Affected by 16 other vulnerabilities.
9.0.21
Affected by 15 other vulnerabilities.
VCID-dzpn-w4b3-vbcm
Aliases:
CVE-2019-17563
GHSA-9xcj-c8cr-8c3c
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
9.0.30
Affected by 15 other vulnerabilities.
VCID-fyfz-6tr5-2fc7
Aliases:
CVE-2017-5664
GHSA-jmvv-524f-hj5j
The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.
9.0.0.M21
Affected by 8 other vulnerabilities.
VCID-g7bk-891a-uufy
Aliases:
CVE-2018-1305
GHSA-jx6h-3fjx-cgv5
Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
9.0.5
Affected by 24 other vulnerabilities.
VCID-hmbm-5ysw-77bu
Aliases:
CVE-2017-5648
GHSA-3vx3-xf6q-r5xp
While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
9.0.0.M18
Affected by 11 other vulnerabilities.
VCID-k9cg-ehdw-dbh6
Aliases:
CVE-2024-21733
GHSA-f4qf-m5gf-8jm8
Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Other, EOL versions may also be affected. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.
9.0.44
Affected by 9 other vulnerabilities.
VCID-m1zd-uytj-3bej
Aliases:
CVE-2017-5647
GHSA-3gv7-3h64-78cm
A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.
9.0.0.M19
Affected by 8 other vulnerabilities.
VCID-ruuh-g3fa-m7d8
Aliases:
CVE-2019-12418
GHSA-hh3j-x4mc-g48r
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
9.0.29
Affected by 15 other vulnerabilities.
VCID-u3ck-cvgt-fuhd
Aliases:
CVE-2017-5650
GHSA-9785-w233-x6hv
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads.
9.0.0.M19
Affected by 8 other vulnerabilities.
VCID-wbaq-j85q-y3c6
Aliases:
CVE-2019-0199
GHSA-qcxh-w3j9-58qr
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
9.0.16
Affected by 19 other vulnerabilities.
VCID-xqjr-7xfw-mbh2
Aliases:
CVE-2025-55752
GHSA-wmwf-9ccg-fff5
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
9.0.109
Affected by 2 other vulnerabilities.
10.1.45
Affected by 1 other vulnerability.
11.0.11
Affected by 2 other vulnerabilities.
VCID-yxpq-rrry-j3h8
Aliases:
CVE-2016-6817
GHSA-698c-2x4j-g9gq
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
9.0.0.M12
Affected by 0 other vulnerabilities.
9.0.0.M13
Affected by 14 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:48:18.982214+00:00 GitLab Importer Affected by VCID-k9cg-ehdw-dbh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2024-21733.yml 38.4.0
2026-04-16T21:52:18.688265+00:00 GitLab Importer Affected by VCID-6wvu-2rmc-mfhj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-8747.yml 38.4.0
2026-04-16T21:52:11.543879+00:00 GitLab Importer Affected by VCID-4tf3-7f5b-2ffu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-7675.yml 38.4.0
2026-04-16T21:51:55.729395+00:00 GitLab Importer Affected by VCID-ayrd-8ntf-hkh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2022-25762.yml 38.4.0
2026-04-16T21:51:06.375921+00:00 GitLab Importer Affected by VCID-m1zd-uytj-3bej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5647.yml 38.4.0
2026-04-16T21:50:01.295156+00:00 GitLab Importer Affected by VCID-hmbm-5ysw-77bu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5648.yml 38.4.0
2026-04-16T21:49:59.449728+00:00 GitLab Importer Affected by VCID-u3ck-cvgt-fuhd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5650.yml 38.4.0
2026-04-16T21:48:44.899903+00:00 GitLab Importer Affected by VCID-3r3s-q21j-c3au https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-6816.yml 38.4.0
2026-04-16T21:48:39.243545+00:00 GitLab Importer Affected by VCID-fyfz-6tr5-2fc7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5664.yml 38.4.0
2026-04-16T21:48:08.914190+00:00 GitLab Importer Affected by VCID-1hdb-24e3-f3d6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5651.yml 38.4.0
2026-04-16T21:47:23.035303+00:00 GitLab Importer Affected by VCID-95d1-arxd-hkd1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-8735.yml 38.4.0
2026-04-16T20:59:37.891781+00:00 GitLab Importer Affected by VCID-ruuh-g3fa-m7d8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-12418.yml 38.4.0
2026-04-16T20:59:37.332495+00:00 GitLab Importer Affected by VCID-dzpn-w4b3-vbcm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-17563.yml 38.4.0
2026-04-16T20:53:38.096203+00:00 GitLab Importer Affected by VCID-wbaq-j85q-y3c6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-0199.yml 38.4.0
2026-04-16T20:41:45.789814+00:00 GitLab Importer Affected by VCID-g7bk-891a-uufy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2018-1305.yml 38.4.0
2026-04-12T00:08:07.416079+00:00 GitLab Importer Affected by VCID-k9cg-ehdw-dbh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2024-21733.yml 38.3.0
2026-04-11T23:08:04.812989+00:00 GitLab Importer Affected by VCID-6wvu-2rmc-mfhj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-8747.yml 38.3.0
2026-04-11T23:07:59.617368+00:00 GitLab Importer Affected by VCID-4tf3-7f5b-2ffu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-7675.yml 38.3.0
2026-04-11T23:07:47.718769+00:00 GitLab Importer Affected by VCID-ayrd-8ntf-hkh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2022-25762.yml 38.3.0
2026-04-11T23:07:12.384499+00:00 GitLab Importer Affected by VCID-m1zd-uytj-3bej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5647.yml 38.3.0
2026-04-11T23:06:03.457828+00:00 GitLab Importer Affected by VCID-hmbm-5ysw-77bu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5648.yml 38.3.0
2026-04-11T23:06:01.345502+00:00 GitLab Importer Affected by VCID-u3ck-cvgt-fuhd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5650.yml 38.3.0
2026-04-11T23:04:45.010499+00:00 GitLab Importer Affected by VCID-3r3s-q21j-c3au https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-6816.yml 38.3.0
2026-04-11T23:04:39.056544+00:00 GitLab Importer Affected by VCID-fyfz-6tr5-2fc7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5664.yml 38.3.0
2026-04-11T23:04:02.628587+00:00 GitLab Importer Affected by VCID-1hdb-24e3-f3d6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5651.yml 38.3.0
2026-04-11T23:03:12.887157+00:00 GitLab Importer Affected by VCID-95d1-arxd-hkd1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-8735.yml 38.3.0
2026-04-11T22:10:51.848552+00:00 GitLab Importer Affected by VCID-ruuh-g3fa-m7d8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-12418.yml 38.3.0
2026-04-11T22:10:51.163204+00:00 GitLab Importer Affected by VCID-dzpn-w4b3-vbcm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-17563.yml 38.3.0
2026-04-11T22:04:26.967656+00:00 GitLab Importer Affected by VCID-wbaq-j85q-y3c6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-0199.yml 38.3.0
2026-04-11T21:52:21.713460+00:00 GitLab Importer Affected by VCID-g7bk-891a-uufy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2018-1305.yml 38.3.0
2026-04-04T14:30:18.545542+00:00 GHSA Importer Affected by VCID-yxpq-rrry-j3h8 https://github.com/advisories/GHSA-698c-2x4j-g9gq 38.1.0
2026-04-04T14:30:17.615010+00:00 GHSA Importer Affected by VCID-6wvu-2rmc-mfhj https://github.com/advisories/GHSA-fjwp-r6fm-q6qw 38.1.0
2026-04-03T00:12:46.702275+00:00 GitLab Importer Affected by VCID-k9cg-ehdw-dbh6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2024-21733.yml 38.1.0
2026-04-02T23:16:33.857046+00:00 GitLab Importer Affected by VCID-6wvu-2rmc-mfhj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-8747.yml 38.1.0
2026-04-02T23:16:26.877317+00:00 GitLab Importer Affected by VCID-4tf3-7f5b-2ffu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-7675.yml 38.1.0
2026-04-02T23:16:11.257629+00:00 GitLab Importer Affected by VCID-ayrd-8ntf-hkh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2022-25762.yml 38.1.0
2026-04-02T23:15:23.448878+00:00 GitLab Importer Affected by VCID-m1zd-uytj-3bej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5647.yml 38.1.0
2026-04-02T23:14:17.769567+00:00 GitLab Importer Affected by VCID-hmbm-5ysw-77bu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5648.yml 38.1.0
2026-04-02T23:14:15.807042+00:00 GitLab Importer Affected by VCID-u3ck-cvgt-fuhd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5650.yml 38.1.0
2026-04-02T23:13:01.807181+00:00 GitLab Importer Affected by VCID-3r3s-q21j-c3au https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-6816.yml 38.1.0
2026-04-02T23:12:56.081466+00:00 GitLab Importer Affected by VCID-fyfz-6tr5-2fc7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5664.yml 38.1.0
2026-04-02T23:12:23.877116+00:00 GitLab Importer Affected by VCID-1hdb-24e3-f3d6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5651.yml 38.1.0
2026-04-02T23:11:36.315900+00:00 GitLab Importer Affected by VCID-95d1-arxd-hkd1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-8735.yml 38.1.0
2026-04-02T22:23:23.228376+00:00 GitLab Importer Affected by VCID-ruuh-g3fa-m7d8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-12418.yml 38.1.0
2026-04-02T22:23:22.660226+00:00 GitLab Importer Affected by VCID-dzpn-w4b3-vbcm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-17563.yml 38.1.0
2026-04-02T22:17:26.093561+00:00 GitLab Importer Affected by VCID-wbaq-j85q-y3c6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-0199.yml 38.1.0
2026-04-02T22:06:08.558239+00:00 GitLab Importer Affected by VCID-g7bk-891a-uufy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2018-1305.yml 38.1.0
2026-04-01T17:36:32.471820+00:00 GitLab Importer Affected by VCID-4tf3-7f5b-2ffu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-7675.yml 38.0.0
2026-04-01T17:36:16.217735+00:00 GitLab Importer Affected by VCID-ayrd-8ntf-hkh3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2022-25762.yml 38.0.0
2026-04-01T17:35:24.766387+00:00 GitLab Importer Affected by VCID-m1zd-uytj-3bej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5647.yml 38.0.0
2026-04-01T17:34:18.650674+00:00 GitLab Importer Affected by VCID-hmbm-5ysw-77bu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5648.yml 38.0.0
2026-04-01T17:34:16.340817+00:00 GitLab Importer Affected by VCID-u3ck-cvgt-fuhd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5650.yml 38.0.0
2026-04-01T17:32:53.220759+00:00 GitLab Importer Affected by VCID-fyfz-6tr5-2fc7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5664.yml 38.0.0
2026-04-01T17:32:19.657715+00:00 GitLab Importer Affected by VCID-1hdb-24e3-f3d6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2017-5651.yml 38.0.0
2026-04-01T17:31:29.177645+00:00 GitLab Importer Affected by VCID-95d1-arxd-hkd1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-8735.yml 38.0.0
2026-04-01T16:41:11.646635+00:00 GitLab Importer Affected by VCID-ruuh-g3fa-m7d8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-12418.yml 38.0.0
2026-04-01T16:41:11.003780+00:00 GitLab Importer Affected by VCID-dzpn-w4b3-vbcm https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-17563.yml 38.0.0
2026-04-01T16:35:04.744805+00:00 GitLab Importer Affected by VCID-wbaq-j85q-y3c6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2019-0199.yml 38.0.0
2026-04-01T16:23:07.292034+00:00 GitLab Importer Affected by VCID-g7bk-891a-uufy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2018-1305.yml 38.0.0
2026-04-01T12:50:40.909510+00:00 GitLab Importer Affected by VCID-6wvu-2rmc-mfhj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-8747.yml 38.0.0
2026-04-01T12:50:16.758760+00:00 GitLab Importer Affected by VCID-3r3s-q21j-c3au https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2016-6816.yml 38.0.0
2026-04-01T12:38:09.536788+00:00 Apache Tomcat Importer Affected by VCID-3r3s-q21j-c3au https://tomcat.apache.org/security-9.html 38.0.0
2026-04-01T12:38:09.504718+00:00 Apache Tomcat Importer Affected by VCID-yxpq-rrry-j3h8 https://tomcat.apache.org/security-9.html 38.0.0
2026-04-01T12:38:09.472016+00:00 Apache Tomcat Importer Affected by VCID-95d1-arxd-hkd1 https://tomcat.apache.org/security-9.html 38.0.0
2026-04-01T12:38:09.404025+00:00 Apache Tomcat Importer Affected by VCID-6wvu-2rmc-mfhj https://tomcat.apache.org/security-9.html 38.0.0
2026-04-01T12:38:06.837032+00:00 Apache Tomcat Importer Affected by VCID-xqjr-7xfw-mbh2 https://tomcat.apache.org/security-9.html 38.0.0