Search for packages
Package details: pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@9.0.45
purl pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@9.0.45
Next non-vulnerable version 9.0.106
Latest non-vulnerable version 11.0.10
Risk 10.0
Vulnerabilities affecting this package (12)
Vulnerability Summary Fixed by
VCID-38hd-brfu-bkbt
Aliases:
CVE-2022-45143
GHSA-rq2w-37h9-vg94
The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.
9.0.69
Affected by 5 other vulnerabilities.
10.1.2
Affected by 5 other vulnerabilities.
VCID-4bq7-1e1e-d7c3
Aliases:
CVE-2024-24549
GHSA-7w75-32cg-r6g2
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
9.0.86
Affected by 3 other vulnerabilities.
10.1.19
Affected by 3 other vulnerabilities.
11.0.0-M17
Affected by 4 other vulnerabilities.
VCID-52jg-1p2w-uqc9
Aliases:
CVE-2021-30640
GHSA-36qh-35cm-5w2w
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
9.0.46
Affected by 11 other vulnerabilities.
10.0.6
Affected by 6 other vulnerabilities.
VCID-59vp-c676-dfa4
Aliases:
CVE-2025-46701
GHSA-h2fw-rfh5-95r3
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
9.0.105
Affected by 2 other vulnerabilities.
10.1.41
Affected by 2 other vulnerabilities.
11.0.7
Affected by 2 other vulnerabilities.
VCID-7nj6-9exh-5qgr
Aliases:
CVE-2022-42252
GHSA-p22x-g9px-3945
If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.
9.0.68
Affected by 6 other vulnerabilities.
10.0.27
Affected by 2 other vulnerabilities.
10.1.1
Affected by 6 other vulnerabilities.
VCID-ghc6-gmwn-wyg2
Aliases:
CVE-2022-29885
GHSA-r84p-88g2-2vx2
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.
9.0.63
Affected by 8 other vulnerabilities.
10.0.21
Affected by 4 other vulnerabilities.
10.1.1
Affected by 6 other vulnerabilities.
VCID-jubv-tebw-3fgb
Aliases:
CVE-2022-34305
GHSA-6j88-6whg-x687
In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.
9.0.65
Affected by 7 other vulnerabilities.
10.0.23
Affected by 3 other vulnerabilities.
VCID-kdkb-2vcc-7ka1
Aliases:
CVE-2023-28708
GHSA-2c9m-w27f-53rm
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
9.0.72
Affected by 6 other vulnerabilities.
10.1.6
Affected by 5 other vulnerabilities.
11.0.0
Affected by 5 other vulnerabilities.
VCID-khwj-pqm5-rbc4
Aliases:
CVE-2021-42340
GHSA-wph7-x527-w3h5
The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
9.0.54
Affected by 10 other vulnerabilities.
10.1.1
Affected by 6 other vulnerabilities.
VCID-mx9m-1qg7-67gh
Aliases:
CVE-2021-43980
GHSA-jx7c-7mj5-9438
The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.
9.0.62
Affected by 9 other vulnerabilities.
10.0.20
Affected by 5 other vulnerabilities.
10.1.1
Affected by 6 other vulnerabilities.
VCID-r5jp-6b4w-rffw
Aliases:
CVE-2023-41080
GHSA-q3mw-pvr8-9ggc
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.
9.0.80
Affected by 6 other vulnerabilities.
10.1.13
Affected by 5 other vulnerabilities.
11.0.0-M11
Affected by 6 other vulnerabilities.
11.0.1
Affected by 3 other vulnerabilities.
VCID-w5uu-nj7c-wka6
Aliases:
CVE-2023-44487
GHSA-qppj-fm5r-hxr3
VSV00013
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
9.0.81
Affected by 4 other vulnerabilities.
10.1.14
Affected by 4 other vulnerabilities.
11.0.0-M12
Affected by 5 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-3h9k-jyh8-zuau A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64. CVE-2021-30639
GHSA-44qp-qhfv-c7f6

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T12:21:35.390582+00:00 GitLab Importer Affected by VCID-59vp-c676-dfa4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2025-46701.yml 37.0.0
2025-08-01T11:37:57.387550+00:00 GitLab Importer Affected by VCID-4bq7-1e1e-d7c3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2024-24549.yml 37.0.0
2025-08-01T11:18:32.039698+00:00 GitLab Importer Affected by VCID-r5jp-6b4w-rffw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-41080.yml 37.0.0
2025-08-01T11:03:57.054039+00:00 GitLab Importer Affected by VCID-kdkb-2vcc-7ka1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-28708.yml 37.0.0
2025-08-01T10:57:24.368086+00:00 GitLab Importer Affected by VCID-38hd-brfu-bkbt https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2022-45143.yml 37.0.0
2025-08-01T10:52:45.201548+00:00 GitLab Importer Affected by VCID-7nj6-9exh-5qgr https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2022-42252.yml 37.0.0
2025-08-01T10:48:54.878094+00:00 GitLab Importer Affected by VCID-mx9m-1qg7-67gh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2021-43980.yml 37.0.0
2025-08-01T10:41:06.338472+00:00 GitLab Importer Affected by VCID-jubv-tebw-3fgb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2022-34305.yml 37.0.0
2025-08-01T10:22:34.031325+00:00 GitLab Importer Affected by VCID-ghc6-gmwn-wyg2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2022-29885.yml 37.0.0
2025-08-01T10:04:33.004470+00:00 GitLab Importer Affected by VCID-khwj-pqm5-rbc4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2021-42340.yml 37.0.0
2025-08-01T09:59:10.600987+00:00 GitLab Importer Affected by VCID-52jg-1p2w-uqc9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2021-30640.yml 37.0.0
2025-08-01T09:30:58.155593+00:00 GHSA Importer Affected by VCID-w5uu-nj7c-wka6 https://github.com/advisories/GHSA-qppj-fm5r-hxr3 37.0.0
2025-07-31T09:24:30.237412+00:00 GitLab Importer Fixing VCID-3h9k-jyh8-zuau https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2021-30639.yml 37.0.0