Search for packages
purl | pkg:maven/org.apache.tomcat/tomcat@11.0.0-M2 |
Tags | Ghost |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2yb1-zq4x-aaad
Aliases: CVE-2023-28709 GHSA-cx6h-86xw-9x34 |
The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. |
Affected by 16 other vulnerabilities. Affected by 6 other vulnerabilities. |
VCID-7sta-sz5f-aaap
Aliases: CVE-2023-28708 GHSA-2c9m-w27f-53rm |
Apache Tomcat vulnerable to Unprotected Transport of Credentials |
Affected by 16 other vulnerabilities. |
VCID-ckkm-g4kc-tfbg
Aliases: CVE-2025-31650 GHSA-3p2h-wqq4-wf4h |
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue. |
Affected by 3 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-04-29T00:32:30.075194+00:00 | Apache Tomcat Importer | Affected by | VCID-ckkm-g4kc-tfbg | https://tomcat.apache.org/security-11.html | 36.0.0 |
2025-03-28T13:19:13.275345+00:00 | Apache Tomcat Importer | Affected by | VCID-7sta-sz5f-aaap | https://tomcat.apache.org/security-11.html | 36.0.0 |
2025-03-28T13:19:13.219954+00:00 | Apache Tomcat Importer | Affected by | VCID-2yb1-zq4x-aaad | https://tomcat.apache.org/security-11.html | 36.0.0 |
2024-09-18T08:17:24.641165+00:00 | Apache Tomcat Importer | Affected by | VCID-7sta-sz5f-aaap | https://tomcat.apache.org/security-11.html | 34.0.1 |
2024-09-18T08:17:24.583351+00:00 | Apache Tomcat Importer | Affected by | VCID-2yb1-zq4x-aaad | https://tomcat.apache.org/security-11.html | 34.0.1 |
2024-01-04T02:15:29.791184+00:00 | Apache Tomcat Importer | Affected by | VCID-7sta-sz5f-aaap | https://tomcat.apache.org/security-11.html | 34.0.0rc1 |
2024-01-04T02:15:29.735983+00:00 | Apache Tomcat Importer | Affected by | VCID-2yb1-zq4x-aaad | https://tomcat.apache.org/security-11.html | 34.0.0rc1 |
2024-01-03T17:38:09.187448+00:00 | GHSA Importer | Affected by | VCID-2yb1-zq4x-aaad | https://github.com/advisories/GHSA-cx6h-86xw-9x34 | 34.0.0rc1 |