Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat-catalina@9.0.19
purl pkg:maven/org.apache.tomcat/tomcat-catalina@9.0.19
Next non-vulnerable version 9.0.106
Latest non-vulnerable version 11.0.9
Risk 10.0
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-53ea-3wyh-xfg7
Aliases:
CVE-2020-17527
GHSA-vvw4-rfwf-p6hx
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
9.0.40
Affected by 5 other vulnerabilities.
10.0.2
Affected by 1 other vulnerability.
VCID-59vp-c676-dfa4
Aliases:
CVE-2025-46701
GHSA-h2fw-rfh5-95r3
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
9.0.105
Affected by 2 other vulnerabilities.
10.1.41
Affected by 2 other vulnerabilities.
11.0.7
Affected by 2 other vulnerabilities.
VCID-8m28-utzk-x7gj
Aliases:
CVE-2022-25762
GHSA-h3ch-5pp2-vh6w
If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.
9.0.21
Affected by 7 other vulnerabilities.
VCID-9wtx-mhfd-sfe4
Aliases:
CVE-2024-52316
GHSA-xcpr-7mr4-h4xq
Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.
9.0.96
Affected by 2 other vulnerabilities.
10.1.30
Affected by 2 other vulnerabilities.
11.0.1
Affected by 2 other vulnerabilities.
VCID-gkeu-um4m-ckef
Aliases:
CVE-2020-9484
GHSA-344f-f5vg-2jfj
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
9.0.35
Affected by 6 other vulnerabilities.
10.0.0-M5
Affected by 1 other vulnerability.
10.0.2
Affected by 1 other vulnerability.
VCID-mx9m-1qg7-67gh
Aliases:
CVE-2021-43980
GHSA-jx7c-7mj5-9438
The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.
9.0.62
Affected by 4 other vulnerabilities.
10.0.20
Affected by 0 other vulnerabilities.
10.1.1
Affected by 4 other vulnerabilities.
VCID-r5jp-6b4w-rffw
Aliases:
CVE-2023-41080
GHSA-q3mw-pvr8-9ggc
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.
9.0.80
Affected by 3 other vulnerabilities.
10.1.13
Affected by 3 other vulnerabilities.
11.0.1
Affected by 2 other vulnerabilities.
VCID-s87f-pf8e-yqcz
Aliases:
CVE-2021-24122
GHSA-2rvv-w9r2-rg7m
When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.
9.0.40
Affected by 5 other vulnerabilities.
10.0.0-M10
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T12:21:34.258373+00:00 GitLab Importer Affected by VCID-59vp-c676-dfa4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2025-46701.yml 37.0.0
2025-08-01T12:03:34.901948+00:00 GitLab Importer Affected by VCID-9wtx-mhfd-sfe4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2024-52316.yml 37.0.0
2025-08-01T11:18:29.924373+00:00 GitLab Importer Affected by VCID-r5jp-6b4w-rffw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2023-41080.yml 37.0.0
2025-08-01T10:48:57.055231+00:00 GitLab Importer Affected by VCID-mx9m-1qg7-67gh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2021-43980.yml 37.0.0
2025-08-01T10:23:46.377752+00:00 GitLab Importer Affected by VCID-8m28-utzk-x7gj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2022-25762.yml 37.0.0
2025-08-01T09:47:02.375015+00:00 GitLab Importer Affected by VCID-s87f-pf8e-yqcz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2021-24122.yml 37.0.0
2025-08-01T09:45:51.695666+00:00 GitLab Importer Affected by VCID-53ea-3wyh-xfg7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2020-17527.yml 37.0.0
2025-08-01T09:32:25.402975+00:00 GitLab Importer Affected by VCID-gkeu-um4m-ckef https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2020-9484.yml 37.0.0