Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat@7.0.105
purl pkg:maven/org.apache.tomcat/tomcat@7.0.105
Next non-vulnerable version 9.0.83
Latest non-vulnerable version 11.0.10
Risk 4.0
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-52jg-1p2w-uqc9
Aliases:
CVE-2021-30640
GHSA-36qh-35cm-5w2w
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
7.0.109
Affected by 1 other vulnerability.
8.5.65
Affected by 10 other vulnerabilities.
8.5.66
Affected by 10 other vulnerabilities.
9.0.45
Affected by 9 other vulnerabilities.
9.0.46
Affected by 9 other vulnerabilities.
10.0.5
Affected by 6 other vulnerabilities.
10.0.6
Affected by 6 other vulnerabilities.
VCID-ps1f-p4ds-zbgc
Aliases:
CVE-2020-8022
GHSA-gc58-v8h3-x2gr
Incorrect Default Permissions in Apache Tomcat ### Withdrawn As per https://lists.apache.org/thread/0z644xfjo49pn2oxcp9qslkvhhw4tb7q this issue only affects the SUSE built artifacts of tomcat and is not relevant for the artifacts on maven central. ### Original Advisory A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 80.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.
8.0.53
Affected by 2 other vulnerabilities.
9.0.35
Affected by 13 other vulnerabilities.
VCID-s87f-pf8e-yqcz
Aliases:
CVE-2021-24122
GHSA-2rvv-w9r2-rg7m
When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.
7.0.107
Affected by 4 other vulnerabilities.
8.5.60
Affected by 12 other vulnerabilities.
9.0.40
Affected by 11 other vulnerabilities.
10.0.0-M10
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-qpdb-4y18-b3hf The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. CVE-2020-13935
GHSA-m7jv-hq7h-mq7c

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T10:12:04.422091+00:00 GitLab Importer Affected by VCID-ps1f-p4ds-zbgc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2020-8022.yml 37.0.0
2025-08-01T09:59:11.934455+00:00 GitLab Importer Affected by VCID-52jg-1p2w-uqc9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2021-30640.yml 37.0.0
2025-08-01T09:47:03.220336+00:00 GitLab Importer Affected by VCID-s87f-pf8e-yqcz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2021-24122.yml 37.0.0
2025-07-31T12:30:49.099119+00:00 GHSA Importer Fixing VCID-qpdb-4y18-b3hf https://github.com/advisories/GHSA-m7jv-hq7h-mq7c 37.0.0
2025-07-31T09:01:52.213818+00:00 GithubOSV Importer Fixing VCID-qpdb-4y18-b3hf https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-m7jv-hq7h-mq7c/GHSA-m7jv-hq7h-mq7c.json 37.0.0
2025-07-31T08:03:24.647914+00:00 Apache Tomcat Importer Fixing VCID-qpdb-4y18-b3hf https://tomcat.apache.org/security-7.html 37.0.0