Search for packages
Package details: pkg:apache/tomcat@11.0.0-M2
purl pkg:apache/tomcat@11.0.0-M2
Next non-vulnerable version 11.0.0-M21
Latest non-vulnerable version 11.0.8
Risk 10.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-2yb1-zq4x-aaad
Aliases:
CVE-2023-28709
GHSA-cx6h-86xw-9x34
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
11.0.0-M5
Affected by 2 other vulnerabilities.
VCID-7sta-sz5f-aaap
Aliases:
CVE-2023-28708
GHSA-2c9m-w27f-53rm
Apache Tomcat vulnerable to Unprotected Transport of Credentials
11.0.0-M3
Affected by 3 other vulnerabilities.
VCID-ah95-hj74-aaaq
Aliases:
CVE-2017-12617
GHSA-xjgh-84hx-56c5
Unrestricted Upload of File with Dangerous Type When running Apache Tomcat with HTTP PUTs enabled it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. There are no reported fixed by versions.
VCID-ckkm-g4kc-tfbg
Aliases:
CVE-2025-31650
GHSA-3p2h-wqq4-wf4h
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
11.0.6
Affected by 1 other vulnerability.
VCID-ma76-864y-aaaf
Aliases:
CVE-2005-4836
GHSA-qrcx-p4rr-g48h
The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote attackers to read JSP source files and obtain sensitive information. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-04-29T00:32:30.044620+00:00 Apache Tomcat Importer Affected by VCID-ckkm-g4kc-tfbg https://tomcat.apache.org/security-11.html 36.0.0
2025-03-28T13:19:13.254002+00:00 Apache Tomcat Importer Affected by VCID-7sta-sz5f-aaap https://tomcat.apache.org/security-11.html 36.0.0
2025-03-28T13:19:13.196373+00:00 Apache Tomcat Importer Affected by VCID-2yb1-zq4x-aaad https://tomcat.apache.org/security-11.html 36.0.0
2024-09-18T08:17:24.620489+00:00 Apache Tomcat Importer Affected by VCID-7sta-sz5f-aaap https://tomcat.apache.org/security-11.html 34.0.1
2024-09-18T08:17:24.557584+00:00 Apache Tomcat Importer Affected by VCID-2yb1-zq4x-aaad https://tomcat.apache.org/security-11.html 34.0.1
2024-01-04T02:15:29.771208+00:00 Apache Tomcat Importer Affected by VCID-7sta-sz5f-aaap https://tomcat.apache.org/security-11.html 34.0.0rc1
2024-01-04T02:15:29.714124+00:00 Apache Tomcat Importer Affected by VCID-2yb1-zq4x-aaad https://tomcat.apache.org/security-11.html 34.0.0rc1