Search for packages
Package details: pkg:apache/tomcat@6.0.48
purl pkg:apache/tomcat@6.0.48
Next non-vulnerable version 6.0.50
Latest non-vulnerable version 11.0.8
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-p378-4jg4-aaam
Aliases:
CVE-2016-8745
GHSA-w3j5-q8f2-3cqq
Information Exposure A bug in the error handling of the NIO HTTP connector in Apache Tomcat resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage.
6.0.50
Affected by 0 other vulnerabilities.
7.0.74
Affected by 25 other vulnerabilities.
7.0.75
Affected by 25 other vulnerabilities.
8.0.41
Affected by 1 other vulnerability.
8.5.9
Affected by 46 other vulnerabilities.
9.0.0+M15
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-q1t4-rzf5-aaac The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. CVE-2016-6816
GHSA-jc7p-5r39-9477
VCID-sc5t-244h-aaas Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types. CVE-2016-8735
GHSA-cw54-59pw-4g8c

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T13:19:32.392756+00:00 Apache Tomcat Importer Fixing VCID-q1t4-rzf5-aaac https://tomcat.apache.org/security-6.html 36.0.0
2025-03-28T13:19:32.341931+00:00 Apache Tomcat Importer Fixing VCID-sc5t-244h-aaas https://tomcat.apache.org/security-6.html 36.0.0
2025-03-28T13:19:32.284579+00:00 Apache Tomcat Importer Affected by VCID-p378-4jg4-aaam https://tomcat.apache.org/security-6.html 36.0.0
2024-09-18T08:17:42.528324+00:00 Apache Tomcat Importer Fixing VCID-q1t4-rzf5-aaac https://tomcat.apache.org/security-6.html 34.0.1
2024-09-18T08:17:42.481312+00:00 Apache Tomcat Importer Fixing VCID-sc5t-244h-aaas https://tomcat.apache.org/security-6.html 34.0.1
2024-09-18T08:17:42.428502+00:00 Apache Tomcat Importer Affected by VCID-p378-4jg4-aaam https://tomcat.apache.org/security-6.html 34.0.1
2024-01-04T02:15:45.651399+00:00 Apache Tomcat Importer Fixing VCID-q1t4-rzf5-aaac https://tomcat.apache.org/security-6.html 34.0.0rc1
2024-01-04T02:15:45.602910+00:00 Apache Tomcat Importer Fixing VCID-sc5t-244h-aaas https://tomcat.apache.org/security-6.html 34.0.0rc1
2024-01-04T02:15:45.551170+00:00 Apache Tomcat Importer Affected by VCID-p378-4jg4-aaam https://tomcat.apache.org/security-6.html 34.0.0rc1