Search for packages
Package details: pkg:apache/tomcat@11.0.0-M5
purl pkg:apache/tomcat@11.0.0-M5
Next non-vulnerable version 11.0.3
Latest non-vulnerable version 11.0.8
Risk 10.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-ah95-hj74-aaaq
Aliases:
CVE-2017-12617
GHSA-xjgh-84hx-56c5
Unrestricted Upload of File with Dangerous Type When running Apache Tomcat with HTTP PUTs enabled it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. There are no reported fixed by versions.
VCID-ma76-864y-aaaf
Aliases:
CVE-2005-4836
GHSA-qrcx-p4rr-g48h
The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote attackers to read JSP source files and obtain sensitive information. There are no reported fixed by versions.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-2yb1-zq4x-aaad The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. CVE-2023-28709
GHSA-cx6h-86xw-9x34

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T13:19:13.206084+00:00 Apache Tomcat Importer Fixing VCID-2yb1-zq4x-aaad https://tomcat.apache.org/security-11.html 36.0.0
2024-09-18T08:17:24.567656+00:00 Apache Tomcat Importer Fixing VCID-2yb1-zq4x-aaad https://tomcat.apache.org/security-11.html 34.0.1
2024-01-04T02:15:29.723130+00:00 Apache Tomcat Importer Fixing VCID-2yb1-zq4x-aaad https://tomcat.apache.org/security-11.html 34.0.0rc1