Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/tomcat@1:9.0.62-37?arch=el9_3
purl pkg:rpm/redhat/tomcat@1:9.0.62-37?arch=el9_3
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-56jv-htmt-rkew
Aliases:
CVE-2023-24998
GHSA-hfrx-6qgj-fp6c
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. There are no reported fixed by versions.
VCID-v7tp-1t4h-zqeg
Aliases:
CVE-2023-28708
GHSA-2c9m-w27f-53rm
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected. There are no reported fixed by versions.
VCID-xgr8-tpv5-q3b2
Aliases:
CVE-2023-28709
GHSA-cx6h-86xw-9x34
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:55:13.528798+00:00 RedHat Importer Affected by VCID-56jv-htmt-rkew https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24998.json 38.0.0
2026-04-01T13:54:41.048258+00:00 RedHat Importer Affected by VCID-v7tp-1t4h-zqeg https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28708.json 38.0.0
2026-04-01T13:53:52.631668+00:00 RedHat Importer Affected by VCID-xgr8-tpv5-q3b2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28709.json 38.0.0