Search for packages
purl | pkg:apache/tomcat@11.0.0-M2 |
Next non-vulnerable version | 11.0.0-M21 |
Latest non-vulnerable version | 11.0.8 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2yb1-zq4x-aaad
Aliases: CVE-2023-28709 GHSA-cx6h-86xw-9x34 |
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. |
Affected by 2 other vulnerabilities. |
VCID-7sta-sz5f-aaap
Aliases: CVE-2023-28708 GHSA-2c9m-w27f-53rm |
Apache Tomcat vulnerable to Unprotected Transport of Credentials |
Affected by 3 other vulnerabilities. |
VCID-ah95-hj74-aaaq
Aliases: CVE-2017-12617 GHSA-xjgh-84hx-56c5 |
Unrestricted Upload of File with Dangerous Type When running Apache Tomcat with HTTP PUTs enabled it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. | There are no reported fixed by versions. |
VCID-ckkm-g4kc-tfbg
Aliases: CVE-2025-31650 GHSA-3p2h-wqq4-wf4h |
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue. |
Affected by 1 other vulnerability. |
VCID-ma76-864y-aaaf
Aliases: CVE-2005-4836 GHSA-qrcx-p4rr-g48h |
The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote attackers to read JSP source files and obtain sensitive information. | There are no reported fixed by versions. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-04-29T00:32:30.044620+00:00 | Apache Tomcat Importer | Affected by | VCID-ckkm-g4kc-tfbg | https://tomcat.apache.org/security-11.html | 36.0.0 |
2025-03-28T13:19:13.254002+00:00 | Apache Tomcat Importer | Affected by | VCID-7sta-sz5f-aaap | https://tomcat.apache.org/security-11.html | 36.0.0 |
2025-03-28T13:19:13.196373+00:00 | Apache Tomcat Importer | Affected by | VCID-2yb1-zq4x-aaad | https://tomcat.apache.org/security-11.html | 36.0.0 |
2024-09-18T08:17:24.620489+00:00 | Apache Tomcat Importer | Affected by | VCID-7sta-sz5f-aaap | https://tomcat.apache.org/security-11.html | 34.0.1 |
2024-09-18T08:17:24.557584+00:00 | Apache Tomcat Importer | Affected by | VCID-2yb1-zq4x-aaad | https://tomcat.apache.org/security-11.html | 34.0.1 |
2024-01-04T02:15:29.771208+00:00 | Apache Tomcat Importer | Affected by | VCID-7sta-sz5f-aaap | https://tomcat.apache.org/security-11.html | 34.0.0rc1 |
2024-01-04T02:15:29.714124+00:00 | Apache Tomcat Importer | Affected by | VCID-2yb1-zq4x-aaad | https://tomcat.apache.org/security-11.html | 34.0.0rc1 |