11.0.18
15 years ago
1 months ago
Known vulnerabilities in the org.apache.tomcat.embed:tomcat-embed-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.apache.tomcat.embed:tomcat-embed-core is a Core Tomcat implementation. Affected versions of this package are vulnerable to Improper Authorization in How to fix Improper Authorization? Upgrade | [,9.0.113)[10.1.0-M1,10.1.50)[11.0.0-M1,11.0.15) |
org.apache.tomcat.embed:tomcat-embed-core is a Core Tomcat implementation. Affected versions of this package are vulnerable to Incorrect Authorization when using an OCSP responder. OCSP response verification and freshness checks can be bypassed, allowing certificate revocation to be bypassed. How to fix Incorrect Authorization? Upgrade | [9.0.83,9.0.114)[10.1.0-M7,10.1.52)[11.0.0-M1,11.0.18) |
org.apache.tomcat.embed:tomcat-embed-core is a Core Tomcat implementation. Affected versions of this package are vulnerable to Improper Certificate Validation in the SNI extension, when client certificate authentication relies exclusively on the Connector (and is not enforced in the web application). The hostname provided via the SNI extension may be different from the hostname in the HTTP host header field. How to fix Improper Certificate Validation? Upgrade | [8.5.0,9.0.113)[10.0.0-M1,10.1.50)[11.0.0-M1,11.0.15) |