Search for packages
Package details: pkg:alpm/archlinux/tomcat10@10.1.40-1
purl pkg:alpm/archlinux/tomcat10@10.1.40-1
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-6qpu-a1ru-qqdw
Aliases:
CVE-2025-49125
GHSA-wc4r-xq3c-5cf3
Apache Tomcat - Security constraint bypass for pre/post-resources Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. There are no reported fixed by versions.
VCID-cf6s-u8r8-kqdh
Aliases:
CVE-2025-48976
GHSA-vv7r-c36w-3prj
Apache Commons FileUpload, Apache Commons FileUpload: FileUpload DoS via part headers Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload. This issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4. Users are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue. There are no reported fixed by versions.
VCID-ckkm-g4kc-tfbg
Aliases:
CVE-2025-31650
GHSA-3p2h-wqq4-wf4h
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue. There are no reported fixed by versions.
VCID-h5vt-s4xq-hkbn
Aliases:
CVE-2025-46701
GHSA-h2fw-rfh5-95r3
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue. There are no reported fixed by versions.
VCID-urcd-kkup-t7c7
Aliases:
CVE-2025-48988
GHSA-h3gc-qfqq-6h8f
Apache Tomcat - DoS in multipart upload Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-06-20T13:38:49.220916+00:00 Arch Linux Importer Affected by VCID-cf6s-u8r8-kqdh https://security.archlinux.org/AVG-2888 36.1.3
2025-06-20T13:38:49.210143+00:00 Arch Linux Importer Affected by VCID-urcd-kkup-t7c7 https://security.archlinux.org/AVG-2888 36.1.3
2025-06-20T13:38:49.199363+00:00 Arch Linux Importer Affected by VCID-6qpu-a1ru-qqdw https://security.archlinux.org/AVG-2888 36.1.3
2025-06-09T20:13:36.164102+00:00 Arch Linux Importer Affected by VCID-ckkm-g4kc-tfbg https://security.archlinux.org/AVG-2888 36.1.0
2025-06-09T20:13:36.150391+00:00 Arch Linux Importer Affected by VCID-h5vt-s4xq-hkbn https://security.archlinux.org/AVG-2888 36.1.0
2025-05-30T23:12:55.072830+00:00 Arch Linux Importer Affected by VCID-h5vt-s4xq-hkbn https://security.archlinux.org/AVG-2888 36.0.0