Search for packages
purl | pkg:maven/org.apache.tomcat/tomcat-coyote@10.0.27 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-c4d1-jsqh-hban
Aliases: CVE-2023-44487 GHSA-qppj-fm5r-hxr3 VSV00013 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Affected by 2 other vulnerabilities. Affected by 1 other vulnerability. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-zkyd-zu9g-mken | If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. |
CVE-2022-42252
GHSA-p22x-g9px-3945 |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-07-03T18:34:11.661893+00:00 | GitLab Importer | Fixing | VCID-zkyd-zu9g-mken | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2022-42252.yml | 37.0.0 |
2025-07-03T17:51:02.862566+00:00 | GHSA Importer | Affected by | VCID-c4d1-jsqh-hban | https://github.com/advisories/GHSA-qppj-fm5r-hxr3 | 37.0.0 |
2025-07-01T14:33:57.013572+00:00 | GHSA Importer | Fixing | VCID-zkyd-zu9g-mken | https://github.com/advisories/GHSA-p22x-g9px-3945 | 36.1.3 |
2025-07-01T12:25:21.770257+00:00 | GithubOSV Importer | Fixing | VCID-zkyd-zu9g-mken | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-p22x-g9px-3945/GHSA-p22x-g9px-3945.json | 36.1.3 |