org.apache.tomcat.embed:tomcat-embed-core vulnerabilities

  • latest version

    11.0.2

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.tomcat.embed:tomcat-embed-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Time-of-check Time-of-use (TOCTOU) Race Condition

    [9.0.0.M1,9.0.98)[10.1.0-M1,10.1.34)[11.0.0-M1,11.0.2)
    • C
    Time-of-check Time-of-use (TOCTOU) Race Condition

    [9.0.0.M1,9.0.98)[10.1.0-M1,10.1.34)[11.0.0-M1,11.0.2)
    • C
    Uncaught Exception

    [9.0.0.M1,9.0.96)[10.1.0-M1,10.1.31)[11.0.0-M1,11.0.0)
    • M
    Inadequate Encryption Strength

    [9.0.93,9.0.96)[10.1.28,10.1.31)[11.0.0-M24,11.0.0)
    • H
    Allocation of Resources Without Limits or Throttling

    [9.0.13,9.0.90)[10.1.0-M1,10.1.25)[11.0.0-M1,11.0.0-M21)
    • H
    Insufficient Session Expiration

    [,9.0.90)[10.1.0-M1,10.1.25)[11.0.0-M1,11.0.0-M21)
    • H
    Denial of Service (DoS)

    [8.5.0,8.5.99)[9.0.0-M1,9.0.86)[10.1.0-M1,10.1.19)[11.0.0-M1,1.0.0-M17)
    • M
    Information Exposure

    [8.5.7,8.5.64)[9.0.0-M11,9.0.44)[10.0.0-M1,10.0.4)
    • H
    Improper Input Validation

    [8.5.0,8.5.96)[9.0.0-M1,9.0.83)[10.1.0-M1,10.1.16)[11.0.0-M1,11.0.0-M10)
    • M
    Incomplete Cleanup

    [8.5.0,8.5.94)[9.0.0-M1,9.0.81)[10.1.0-M1,10.1.14)[11.0.0-M1,11.0.0-M12)
    • M
    Improper Input Validation

    [8.5.0,8.5.94)[9.0.0-M1,9.0.81)[10.1.0-M1,10.1.14)[11.0.0-M1,11.0.0-M12)
    • M
    Incomplete Cleanup

    [8.5.85,8.5.94)[9.0.70,9.0.81)
    • H
    Denial of Service (DoS)

    [,8.5.94)[9.0.0,9.0.81)[10.0.0,10.1.14)[11.0.0-M3,11.0.0-M12)
    • M
    Access Restriction Bypass

    [8.5.0,8.5.93)[9.0.0-M1,9.0.80)[10.1.0-M1,10.1.13)[11.0.0-M1,11.0.0-M11)
    • H
    Information Exposure

    [8.5.88,8.5.89)[9.0.74,9.0.75)[10.1.8,10.1.9)[11.0.0-M5,11.0.0-M6)
    • M
    Denial of Service (DoS)

    [8.5.85,8.5.88)[9.0.71,9.0.74)[10.1.5,10.1.8)[11.0.0-M2,11.0.0-M5)
    • M
    Unprotected Transport of Credentials

    [8.5.0,8.5.86)[9.0.0-M1,9.0.72)[10.1.0-M1,10.1.6)[11.0.0-M1,11.0.0-M3)
    • M
    Denial of Service (DoS)

    [8.5.0,8.5.85)[9.0.0-M1,9.0.71)[10.1.0-M1,10.1.5)[11.0.0-M1,11.0.0-M3)
    • H
    Improper Input Validation

    [8.5.83,8.5.84)[9.0.40,9.0.69)[10.1.0-M1,10.1.2)
    • L
    HTTP Request Smuggling

    [8.5.0,8.5.53)[9.0.0-M1,9.0.68)[10.0.0-M1,10.0.27)[10.1.0-M1,10.1.1)
    • L
    Information Exposure

    [8.5.0,8.5.78)[9.0.0-M1,9.0.62)[10.0.0-M1,10.0.20)[10.1.0-M1,10.1.0-M14)
    • H
    Privilege Escalation

    [8.5.55,8.5.75)[9.0.0,9.0.58)[10.0.0-M1,10.0.16)[10.1.0-M1,10.1.0-M10)
    • H
    Denial of Service (DoS)

    [10.0.0,10.0.4)[8.0.0,8.5.64)[9.0.0,9.0.44)
    • M
    Improper Input Validation

    [10.0.0-M1,10.0.6)[9.0.0.M1,9.0.46)[8.5.0,8.5.66)[7.0.0,7.0.109)
    • M
    HTTP Request Smuggling

    [10.0.0-M1,10.0.7)[9.0.0.M1,9.0.48)[8.5.0,8.5.68)
    • H
    Denial of Service (DoS)

    [10.0.3,10.0.5)[9.0.44,9.0.45)[8.5.64,8.5.65)
    • M
    HTTP Request Smuggling

    [10.0.0-M1,10.0.2)[9.0.0.M1,9.0.43)[8.5.0,8.5.63)
    • H
    Remote Code Execution (RCE)

    [10.0.0-M1,10.0.2)[9.0.0.M1,9.0.43)[8.5.0,8.5.63)[7.0.0,7.0.108)
    • M
    Information Disclosure

    [10.0.0-M1,10.0.0-M10)[9.0.0.M1,9.0.40)[8.5.0,8.5.60)[7.0.0,7.0.107)
    • M
    Information Exposure

    [8.5.0,8.5.60)[9.0.0,9.0.40)[10.0.0-M1,10.0.0-M10)
    • M
    HTTP Request Smuggling

    [10.0.0-M1,10.0.0-M8)[9.0.0.M5,9.0.38)[8.5.1,8.5.58)
    • M
    Denial of Service (DoS)

    [10.0.0-M1,10.0.0-M7)[9.0.0.M5,9.0.37)[8.5.1,8.5.57)
    • H
    Denial of Service (DoS)

    [8.5.0,8.5.56)[9.0.0.M1,9.0.36)[10.0.0-M1,10.0.0-M6)
    • H
    Remote Code Execution (RCE)

    [10.0.0-M1,10.0.0-M5)[9.0.0M1,9.0.35)[8.5.0,8.5.55)[7.0.0,7.0.104)
    • L
    HTTP Request Smuggling

    [7.0.98,7.0.100)[8.5.48,8.5.51)[9.0.28,9.0.31)
    • H
    Privilege Escalation

    [9.0.16,9.0.29)
    • L
    Session Fixation

    [9.0.0.M1,9.0.30)[8.5.0,8.5.50)[,7.0.99)
    • M
    Information Exposure

    [4.1.0,4.1.37)[5.5.0,5.5.26)[6.0.0,6.0.16)
    • H
    Denial of Service (DoS)

    [8.5.0,8.5.40)[9.0.0.M1,9.0.20)
    • L
    Cross-site Scripting (XSS)

    [9.0.0.M1,9.0.18)[8.5.0,8.5.40)[7.0.0,7.0.94)
    • H
    Remote Code Execution

    [7.0.0,7.0.94)[8.5.0,8.5.40)[9.0.0.M1,9.0.18)
    • H
    Denial of Service (DoS)

    [8.5.0,8.5.38)[9.0.0.M1,9.0.16)
    • M
    Open Redirect

    [7.0.23,7.0.91)[8.5.0,8.5.34)[9.0.0,9.0.12)
    • H
    Denial of Service (DoS)

    [,7.0.90)[8.0.0,8.0.52)[8.5.0,8.5.32)[9.0.0,9.0.10)
    • M
    Information Exposure

    [8.5.0,8.5.32)[9.0.0,9.0.10)
    • C
    Insecure Defaults

    [,7.0.89)[8.0.0,8.0.53)[8.5.0,8.5.32)[9.0.0,9.0.9)
    • M
    Access Restriction Bypass

    [7.0.0,7.0.85)[8.0.0.RC1,8.0.50)[8.5.0,8.5.28)[9.0.0.M1,9.0.5)
    • M
    Directory Traversal

    [9.0.0M1,9.0.5)[8.5.0,8.5.28)[8.0.0RC1,8.0.50)[7.0.0,7.0.85)
    • H
    Information Exposure

    [8.5.7,8.5.11)[9.0.0.M1,9.0.0.M17)
    • H
    Arbitrary Code Execution

    [,7.0.82)[8,8.0.46)[8.5,8.5.22)[9.0.0.M1,9.0.1)
    • H
    Access Restriction Bypass

    [7.0.0,7.0.78)[8.0.0RC1,8.0.44)[8.5.0,8.5.15)[9.0.0.M1,9.0.0.M21)
    • H
    Directory Traversal

    [8.5.0,8.5.16)[9.0.0.M1,9.0.0.M22)
    • H
    Information Exposure

    [7.0.0,7.0.77)[8.0.0-RC1,8.0.43)[8.5.0,8.5.13)[9.0.0.M1,9.0.0.M19)
    • H
    Denial of Service (DoS)

    [8.5.0,8.5.13)[9.0.0.M1,9.0.0.M19)
    • C
    Information Exposure

    [8.5.0,8.5.13)[9.0.0.M1,9.0.0.M19)
    • C
    Information Exposure

    [7.0.0,7.0.76)[8.0.0-RC1,8.0.42)[8.5.0,8.5.12)[9.0.0.M1,9.0.0.M17)
    • H
    Denial of Service (DoS)

    [7.0.0,7.0.70)[8.0,8.0.36)[8.5.0,8.5.3)[9-alpha,9.0.0.M7)
    • H
    Arbitrary File Upload

    [7.0.0,7.0.40)
    • H
    Arbitrary File Upload

    [7.0.0,7.0.40)
    • H
    Information Exposure

    [7,7.0.74)[8.5.0,8.5.9)[8.0.0RC1,8.0.40)[9.0.0M1,9.0.0M15)
    • H
    Denial of Service (DoS)

    [8.5.0,8.5.8)[9.0.0M1,9.0.0M13)
    • H
    Information Exposure

    [7.0.0,7.0.73)[8,8.0.39)[8.5.0,8.5.8)[9-alpha,9.0.0.M13)
    • H
    Access Restriction Bypass

    [7.0.0,7.0.72)[8,8.0.37)[8.5.0,8.5.5)[9-alpha,9.0.0.M10)
    • M
    Information Exposure

    [8,8.0.37)[8.5.0,8.5.5)[9-alpha,9.0.0.M10)
    • M
    Timing Attack

    [7.0.0,7.0.72)[8.0.0-RC1,8.0.37)[8.5.0,8.5.5)[9.0.0.M1,9.0.0.M10)
    • M
    Directory Traversal

    [7.0.0,7.0.65)[8,8.0.27)
    • H
    Information Exposure

    [7.0.0,7.0.66)[8.0.0-RC1,8.0.30)[9.0.0.M1,9.0.0.M2)
    • M
    Information Exposure

    [7.0.0,7.0.68)[8.0.0-RC1,8.0.32)[9.0.0.M1,9.0.0.M3)
    • H
    Access Restriction Bypass

    [7.0.0,7.0.68)[8.0.0-RC1,8.0.32)[9.0.0.M1,9.0.0.M3)
    • M
    Directory Traversal

    [7.0.0,7.0.68)[8.0.0-RC1,8.0.30)[9.0.0.M1,9.0.0.M2)
    • M
    Access Restriction Bypass

    [7.0.0,7.0.68)[8.0.0-RC1,8.0.32)[9.0.0.M1,9.0.0.M3)
    • M
    Cross-site Scripting (XSS)

    [7.0.0,7.0.6)
    • M
    Access Restriction Bypass

    [7.0.0,7.0.10)
    • M
    Access Restriction Bypass

    [7.0.11,7.0.12)
    • M
    Access Restriction Bypass

    [7.0.0,7.0.12)
    • M
    Access Restriction Bypass

    [7.0.12,7.0.14)
    • M
    Arbitrary File Access

    [7.0.0,7.0.17)
    • M
    Information Exposure

    [7.0.0,7.0.22)
    • M
    Privilege Elevation

    [7.0.0,7.0.22)
    • M
    Denial of Service (DoS)

    [7.0.0,7.0.23)
    • M
    Improper Authentication

    [7.0.0,7.0.12)
    • M
    Improper Input Validation

    [7.0.0,7.0.19)
    • M
    Improper Access Control

    [7.0.0,7.0.58)[8.0.0-RC1,8.0.16)
    • H
    Denial of Service (DoS)

    [7.0.0,7.0.55)[8.0.0-RC1,8.0.9)
    • M
    HTTP Request Smuggling

    [7.0.0,7.0.55)[8,8.0.9)
    • L
    Directory Traversal

    [7.0.0,7.0.4)[6.0.0,6.1.0)[5.5.0,5.6.0)
    • M
    Access Restriction Bypass

    [7.0.0,7.0.11)
    • M
    Improper Input Validation

    [7.0.0,7.0.12)
    • L
    Information Exposure

    [7.0.0,7.0.17)
    • M
    Denial of Service (DoS)

    [7.0.0,7.0.53)[8,8.0.4)
    • M
    Access Restriction Bypass

    [7.0.0,7.0.53)[8.0.0-RC1,8.0.4)
    • M
    Arbitrary File Read

    [7.0.0,7.0.54)[8.0.0-RC1,8.0.6)
    • M
    Cross-site Request Forgery (CSRF)

    [7.0.0,7.0.32)
    • M
    Denial of Service (DoS)

    [7.0.0,7.0.23)
    • M
    Access Restriction Bypass

    [7.0.0,7.0.30)
    • M
    Access Restriction Bypass

    [7.0.0,7.0.30)
    • M
    Improper Authentication

    [7.0.0,7.0.30)
    • M
    Improper Authentication

    [7.0.0,7.0.30)
    • M
    Improper Authentication

    [7.0.0,7.0.33)
    • L
    Information Exposure

    [7.0.0,7.0.40)
    • M
    Information Exposure

    [7.0.0,7.0.50)[8.0.0-RC1,8.0.0-RC11)
    • M
    Cross-site Scripting (XSS)

    [7.0.0,7.0.4]
    • M
    Access Restriction Bypass

    [7.0.0,7.0.12)
    • M
    Cryptographic Issues

    [7.0.0,7.0.12)

    Package versions

    1 - 100 of 406 Results
    versionpublisheddirect vulnerabilities
    11.0.25 Dec, 2024
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    11.0.16 Nov, 2024
    • 2
      C
    • 0
      H
    • 0
      M
    • 0
      L
    11.0.03 Oct, 2024
    • 2
      C
    • 0
      H
    • 0
      M
    • 0
      L
    11.0.0-M2613 Sep, 2024
    • 3
      C
    • 0
      H
    • 1
      M
    • 0
      L
    11.0.0-M255 Sep, 2024
    • 3
      C
    • 0
      H
    • 1
      M
    • 0
      L
    11.0.0-M242 Aug, 2024
    • 3
      C
    • 0
      H
    • 1
      M
    • 0
      L
    11.0.0-M222 Jul, 2024
    • 3
      C
    • 0
      H
    • 0
      M
    • 0
      L
    11.0.0-M2114 Jun, 2024
    • 3
      C
    • 0
      H
    • 0
      M
    • 0
      L
    11.0.0-M203 May, 2024
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M199 Apr, 2024
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M189 Mar, 2024
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M1713 Feb, 2024
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M164 Jan, 2024
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M157 Dec, 2023
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M149 Nov, 2023
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M1311 Oct, 2023
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M129 Oct, 2023
    • 3
      C
    • 2
      H
    • 0
      M
    • 0
      L
    11.0.0-M1123 Aug, 2023
    • 3
      C
    • 3
      H
    • 2
      M
    • 0
      L
    11.0.0-M108 Aug, 2023
    • 3
      C
    • 3
      H
    • 3
      M
    • 0
      L
    11.0.0-M94 Jul, 2023
    • 3
      C
    • 4
      H
    • 3
      M
    • 0
      L
    11.0.0-M72 Jun, 2023
    • 3
      C
    • 4
      H
    • 3
      M
    • 0
      L
    11.0.0-M63 May, 2023
    • 3
      C
    • 4
      H
    • 3
      M
    • 0
      L
    11.0.0-M512 Apr, 2023
    • 3
      C
    • 5
      H
    • 3
      M
    • 0
      L
    11.0.0-M427 Feb, 2023
    • 3
      C
    • 4
      H
    • 4
      M
    • 0
      L
    11.0.0-M317 Feb, 2023
    • 3
      C
    • 4
      H
    • 4
      M
    • 0
      L
    11.0.0-M11 Dec, 2022
    • 3
      C
    • 3
      H
    • 5
      M
    • 0
      L
    10.1.345 Dec, 2024
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    10.1.337 Nov, 2024
    • 2
      C
    • 0
      H
    • 0
      M
    • 0
      L
    10.1.313 Oct, 2024
    • 2
      C
    • 0
      H
    • 0
      M
    • 0
      L
    10.1.3014 Sep, 2024
    • 3
      C
    • 0
      H
    • 1
      M
    • 0
      L
    10.1.295 Sep, 2024
    • 3
      C
    • 0
      H
    • 1
      M
    • 0
      L
    10.1.28