Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat-coyote@8.5.88
purl pkg:maven/org.apache.tomcat/tomcat-coyote@8.5.88
Next non-vulnerable version 8.5.96
Latest non-vulnerable version 11.0.10
Risk 10.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-2n65-91en-cqa8
Aliases:
CVE-2023-46589
GHSA-fccv-jmmp-qg76
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.
8.5.96
Affected by 0 other vulnerabilities.
9.0.83
Affected by 1 other vulnerability.
10.1.16
Affected by 1 other vulnerability.
11.0.1
Affected by 1 other vulnerability.
VCID-m1mz-s5dd-uub7
Aliases:
CVE-2023-34981
GHSA-mppv-79ch-vw6q
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak.
8.5.89
Affected by 3 other vulnerabilities.
VCID-r5jp-6b4w-rffw
Aliases:
CVE-2023-41080
GHSA-q3mw-pvr8-9ggc
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.
8.5.93
Affected by 2 other vulnerabilities.
9.0.80
Affected by 3 other vulnerabilities.
10.1.13
Affected by 3 other vulnerabilities.
11.0.1
Affected by 1 other vulnerability.
VCID-w5uu-nj7c-wka6
Aliases:
CVE-2023-44487
GHSA-qppj-fm5r-hxr3
VSV00013
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
8.5.94
Affected by 1 other vulnerability.
9.0.81
Affected by 2 other vulnerabilities.
10.1.14
Affected by 2 other vulnerabilities.
11.0.0-M12
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-c32f-584t-xuam The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. CVE-2023-28709
GHSA-cx6h-86xw-9x34
VCID-pqmr-zjbb-8fhv Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. CVE-2023-24998
GHSA-hfrx-6qgj-fp6c

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T13:41:38.413221+00:00 GHSA Importer Fixing VCID-c32f-584t-xuam https://github.com/advisories/GHSA-cx6h-86xw-9x34 37.0.0
2025-08-01T13:41:29.891653+00:00 GHSA Importer Affected by VCID-m1mz-s5dd-uub7 https://github.com/advisories/GHSA-mppv-79ch-vw6q 37.0.0
2025-08-01T13:40:34.332084+00:00 GHSA Importer Fixing VCID-pqmr-zjbb-8fhv https://github.com/advisories/GHSA-hfrx-6qgj-fp6c 37.0.0
2025-08-01T11:26:46.422814+00:00 GitLab Importer Affected by VCID-2n65-91en-cqa8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2023-46589.yml 37.0.0
2025-08-01T11:18:28.802809+00:00 GitLab Importer Affected by VCID-r5jp-6b4w-rffw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2023-41080.yml 37.0.0
2025-08-01T09:31:01.333413+00:00 GHSA Importer Affected by VCID-w5uu-nj7c-wka6 https://github.com/advisories/GHSA-qppj-fm5r-hxr3 37.0.0
2025-07-31T09:28:27.721781+00:00 GitLab Importer Fixing VCID-pqmr-zjbb-8fhv https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-coyote/CVE-2023-24998.yml 37.0.0
2025-07-31T08:45:26.527297+00:00 GithubOSV Importer Affected by VCID-m1mz-s5dd-uub7 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-mppv-79ch-vw6q/GHSA-mppv-79ch-vw6q.json 37.0.0
2025-07-31T08:44:40.987600+00:00 GithubOSV Importer Fixing VCID-c32f-584t-xuam https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-cx6h-86xw-9x34/GHSA-cx6h-86xw-9x34.json 37.0.0
2025-07-31T08:43:01.167163+00:00 GithubOSV Importer Fixing VCID-pqmr-zjbb-8fhv https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-hfrx-6qgj-fp6c/GHSA-hfrx-6qgj-fp6c.json 37.0.0