Versions Packages Information History CVEs Related Badges Report

Versions for tomcat

472 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux Edge
testing
tomcat9 9.0.39 Potentially vulnerable - holger.jaekel@gmx.de
Alpine Linux Edge
testing
tomcat9-examples 9.0.39 Potentially vulnerable - holger.jaekel@gmx.de
Alpine Linux Edge
testing
tomcat9-openrc 9.0.39 Potentially vulnerable - holger.jaekel@gmx.de
Alpine Linux Edge
testing
tomcat9-doc 9.0.39 Potentially vulnerable - holger.jaekel@gmx.de
Alpine Linux Edge
testing
tomcat9-admin 9.0.39 Potentially vulnerable - holger.jaekel@gmx.de
ALT Linux p9 tomcat 9.0.37 Potentially vulnerable System/Servers slev@altlinux.org
ALT Sisyphus tomcat 9.0.37 Potentially vulnerable System/Servers slev@altlinux.org
Amazon Linux 1
updates
tomcat8 8.5.60 System Environment/Daemons -
Amazon Linux 1
updates
tomcat8 8.5.57 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat8 8.5.56 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat8 8.5.51 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat8 8.5.50 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat8 8.5.42 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat8 8.5.40 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat8 8.5.32 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
main
tomcat8 8.5.29 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat80 8.0.53 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
main
tomcat80 8.0.50 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat7 7.0.107 System Environment/Daemons -
Amazon Linux 1
updates
tomcat7 7.0.104 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat7 7.0.100 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat7 7.0.94 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat7 7.0.91 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
updates
tomcat7 7.0.90 Potentially vulnerable System Environment/Daemons -
Amazon Linux 1
main
tomcat7 7.0.85 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Apertis v2020
v2020/development
tomcat9 9.0.31 Potentially vulnerable main pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Apertis v2020
v2020-updates/development
tomcat9 9.0.31 Potentially vulnerable main pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Apertis v2020
v2020/development
tomcat8 8.5.38 Potentially vulnerable main pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Apertis v2021 Development
v2021dev3/development
tomcat9 9.0.31 Potentially vulnerable main pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Arch
extra
tomcat9 9.0.41 - -
Arch
extra
tomcat8 8.5.61 - -
Arch
extra
tomcat7 7.0.107 - -
AUR apache-tomcat 8.5.27 Potentially vulnerable - alrii14344@aur
Astra Orel Stable
main
tomcat8 8.5.54 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Astra Orel Stable
main
tomcat8.0 8.0.46 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, tjaalton@debian.org
Astra Orel Current
main
tomcat8 8.5.54 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Astra Orel Current
main
tomcat8.0 8.0.46 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, tjaalton@debian.org
CentOS 6
os
tomcat6 6.0.24 Potentially vulnerable Networking/Daemons -
CentOS 6
updates
tomcat6 6.0.24 Potentially vulnerable Networking/Daemons -
CentOS 6
updates
tomcat6 6.0.24 Potentially vulnerable Networking/Daemons -
CentOS 7
os
tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
CentOS 7
updates
tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Chocolatey Apache Tomcat 9.0.40 - -
Debian Oldstable
oldstable/main
tomcat8 8.5.54 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Debian Oldstable
oldstable/main
tomcat7 7.0.75 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Debian Stable
stable/main
tomcat9 9.0.31 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Debian Stable Backports
main
tomcat9 9.0.41 misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Debian Stable Backports
main
tomcat9 9.0.39 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Debian Testing
testing/main
tomcat9 9.0.41 misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Debian Unstable
main
tomcat9 9.0.41 misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Debian Experimental
main
tomcat10 10.0.0 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Debian Experimental
main
tomcat8 8.5.39 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Deepin
main
tomcat9 9.0.31 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Devuan 1.0 (Jessie)
jessie/main
tomcat8 8.0.14 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Devuan 1.0 (Jessie)
jessie/main
tomcat7 7.0.56 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Devuan 1.0 (Jessie)
jessie/main
tomcat6 6.0.45 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, drazzib@debian.org, ebourg@apache.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Devuan 2.0 (ASCII)
ascii/main
tomcat8 8.5.54 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Devuan 2.0 (ASCII)
ascii/main
tomcat7 7.0.75 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Devuan 3.0 (Beowulf)
beowulf/main
tomcat9 9.0.16 Potentially vulnerable misc devuan-dev@lists.dyne.org, andi@bastelmap.de
Devuan 4.0 (Chimaera)
chimaera/main
tomcat9 9.0.40 misc andi@bastelmap.de
Devuan Unstable
unstable/main
tomcat9 9.0.40 misc andi@bastelmap.de
DistroWatch.com apache-tomcat 9.0.41 - -
DPorts www/tomcat9 9.0.39 Potentially vulnerable www vvd@unislabs.com
DPorts www/tomcat85 8.5.59 Potentially vulnerable www vvd@unislabs.com
DPorts www/tomcat7 7.0.106 www ale@freebsd.org
EPEL 6 tomcat 7.0.106 System Environment/Daemons -
Exherbo
net
www-servers/tomcat-bin 8.5.61 www-servers fallback-mnt-exherbo@repology
Fedora 26
updates
tomcat 8.0.50 Potentially vulnerable System Environment/Daemons -
Fedora 26
release
tomcat 8.0.43 Potentially vulnerable System Environment/Daemons -
Fedora 27
updates
tomcat 8.0.51 Potentially vulnerable System Environment/Daemons -
Fedora 27
release
tomcat 8.0.46 Potentially vulnerable System Environment/Daemons -
Fedora 28
updates
tomcat 8.5.35 Potentially vulnerable System Environment/Daemons -
Fedora 28
release
tomcat 8.5.29 Potentially vulnerable System Environment/Daemons -
Fedora 29
updates
tomcat 9.0.26 Potentially vulnerable Unspecified -
Fedora 29
release
tomcat 9.0.10 Potentially vulnerable System Environment/Daemons -
Fedora 30
updates
tomcat 9.0.34 Potentially vulnerable Unspecified -
Fedora 30
release
tomcat 9.0.13 Potentially vulnerable Unspecified -
Fedora 31
updates
tomcat 9.0.39 Potentially vulnerable Unspecified -
Fedora 31
release
tomcat 9.0.26 Potentially vulnerable Unspecified -
Fedora 32
updates
tomcat 9.0.39 Potentially vulnerable Unspecified -
Fedora 32
release
tomcat 9.0.31 Potentially vulnerable Unspecified -
Fedora 33
updates
tomcat 9.0.41 Unspecified -
Fedora 33
release
tomcat 9.0.38 Potentially vulnerable Unspecified -
Fedora Rawhide tomcat 9.0.41 Unspecified -
FreeBSD Ports www/tomcat9 9.0.41 www vvd@unislabs.com
FreeBSD Ports www/tomcat85 8.5.61 www vvd@unislabs.com
FreeBSD Ports www/tomcat7 7.0.107 www ale@freebsd.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 9.0.21 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
net-kit
www-servers/tomcat 9.0.21 Potentially vulnerable www-servers java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 9.0.20 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
net-kit
www-servers/tomcat 9.0.20 Potentially vulnerable www-servers java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 9.0.7 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
net-kit
www-servers/tomcat 9.0.7 Potentially vulnerable www-servers java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 8.5.42 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
net-kit
www-servers/tomcat 8.5.42 Potentially vulnerable www-servers java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 8.5.41 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
net-kit
www-servers/tomcat 8.5.41 Potentially vulnerable www-servers java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 8.5.23 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 8.0.53 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
net-kit
www-servers/tomcat 8.0.53 Potentially vulnerable www-servers java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 7.0.94 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
net-kit
www-servers/tomcat 7.0.94 Potentially vulnerable www-servers java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 7.0.82 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 6.0.53 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 6.0.44 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 5.5.34 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 5.5.27 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 4.1.36 Potentially vulnerable dev-java java@gentoo.org
Funtoo 1.4
java-kit
dev-java/tomcat-servlet-api 3 Potentially vulnerable dev-java java@gentoo.org
Gentoo dev-java/tomcat-servlet-api 9.0.41 dev-java java@gentoo.org
Gentoo www-servers/tomcat 9.0.41 www-servers java@gentoo.org
Gentoo dev-java/tomcat-servlet-api 9.0.40 dev-java java@gentoo.org
Gentoo www-servers/tomcat 9.0.40 www-servers java@gentoo.org
Gentoo dev-java/tomcat-servlet-api 8.5.61 dev-java java@gentoo.org
Gentoo www-servers/tomcat 8.5.61 www-servers java@gentoo.org
Gentoo dev-java/tomcat-servlet-api 8.5.60 dev-java java@gentoo.org
Gentoo www-servers/tomcat 8.5.60 www-servers java@gentoo.org
Gentoo dev-java/tomcat-servlet-api 7.0.107 dev-java java@gentoo.org
Gentoo www-servers/tomcat 7.0.107 www-servers java@gentoo.org
Gentoo dev-java/tomcat-servlet-api 6.0.53 Potentially vulnerable dev-java java@gentoo.org
Gentoo dev-java/tomcat-servlet-api 5.5.36 Potentially vulnerable dev-java java@gentoo.org
Gentoo dev-java/tomcat-servlet-api 4.1.40 Potentially vulnerable dev-java java@gentoo.org
GNU Guix java-tomcat 8.5.53 Potentially vulnerable - -
Homebrew tomcat 9.0.41 - -
Homebrew tomcat@8 8.5.61 - -
Homebrew tomcat@7 7.0.107 - -
Hyperbola
extra
tomcat8 8.0.42 Potentially vulnerable - -
Hyperbola
extra
tomcat7 7.0.76 Potentially vulnerable - -
Kali Linux Rolling
main
tomcat9 9.0.41 misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 9.0.38 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 20.7
nokit
www-servers/tomcat 9.0.38 Potentially vulnerable www-servers java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 9.0.37 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 8.5.59 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 20.7
nokit
www-servers/tomcat 8.5.59 Potentially vulnerable www-servers java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 8.5.58 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 20.7
nokit
www-servers/tomcat 8.5.58 Potentially vulnerable www-servers java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 8.5.57 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 20.7
nokit
www-servers/tomcat 8.5.57 Potentially vulnerable www-servers java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 7.0.106 dev-java java@gentoo.org
LiGurOS 20.7
nokit
www-servers/tomcat 7.0.106 www-servers java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 7.0.105 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 20.7
nokit
www-servers/tomcat 7.0.105 Potentially vulnerable www-servers java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 6.0.53 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 5.5.36 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 20.7
nokit
dev-java/tomcat-servlet-api 4.1.40 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 9.0.38 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 21.1
nokit
www-servers/tomcat 9.0.38 Potentially vulnerable www-servers java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 9.0.37 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 8.5.59 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 21.1
nokit
www-servers/tomcat 8.5.59 Potentially vulnerable www-servers java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 8.5.58 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 21.1
nokit
www-servers/tomcat 8.5.58 Potentially vulnerable www-servers java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 8.5.57 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 7.0.106 dev-java java@gentoo.org
LiGurOS 21.1
nokit
www-servers/tomcat 7.0.106 www-servers java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 6.0.53 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 5.5.36 Potentially vulnerable dev-java java@gentoo.org
LiGurOS 21.1
nokit
dev-java/tomcat-servlet-api 4.1.40 Potentially vulnerable dev-java java@gentoo.org
Linuxbrew tomcat 9.0.41 - -
Linuxbrew tomcat@8 8.5.61 - -
Linuxbrew tomcat@7 7.0.107 - -
Mageia 6
core/updates
tomcat 8.0.53 Potentially vulnerable Development/Java -
Mageia 6
core/updates
tomcat 8.0.50 Potentially vulnerable Development/Java -
Mageia 6
core/updates
tomcat 8.0.47 Potentially vulnerable Development/Java -
Mageia 6
core/updates
tomcat 8.0.46 Potentially vulnerable Development/Java -
Mageia 6
core/release
tomcat 8.0.44 Potentially vulnerable Development/Java -
Mageia 7
core/updates
tomcat 9.0.39 Potentially vulnerable Development/Java -
Mageia 7
core/updates
tomcat 9.0.38 Potentially vulnerable Development/Java -
Mageia 7
core/updates
tomcat 9.0.37 Potentially vulnerable Development/Java -
Mageia 7
core/updates
tomcat 9.0.35 Potentially vulnerable Development/Java -
Mageia 7
core/updates
tomcat 9.0.31 Potentially vulnerable Development/Java -
Mageia 7
core/updates
tomcat 9.0.30 Potentially vulnerable Development/Java -
Mageia 7
core/updates
tomcat 9.0.21 Potentially vulnerable Development/Java -
Mageia 7
core/release
tomcat 9.0.13 Potentially vulnerable Development/Java -
Mageia Cauldron
core/release
tomcat 9.0.41 Development/Java -
Manjaro Stable
extra
tomcat9 9.0.41 - -
Manjaro Stable
extra
tomcat8 8.5.61 - -
Manjaro Stable
extra
tomcat7 7.0.107 - -
Manjaro Testing
extra
tomcat9 9.0.41 - -
Manjaro Testing
extra
tomcat8 8.5.61 - -
Manjaro Testing
extra
tomcat7 7.0.107 - -
Manjaro Unstable
extra
tomcat9 9.0.41 - -
Manjaro Unstable
extra
tomcat8 8.5.61 - -
Manjaro Unstable
extra
tomcat7 7.0.107 - -
MidnightBSD mports www/tomcat9 9.0.31 Potentially vulnerable www -
MidnightBSD mports www/tomcat85 8.5.51 Potentially vulnerable www -
MidnightBSD mports www/tomcat7 7.0.100 Potentially vulnerable www -
nixpkgs stable apache-tomcat 9.0.31 Potentially vulnerable - abcz2.uprola@gmail.com
nixpkgs stable apache-tomcat 8.5.51 Potentially vulnerable - abcz2.uprola@gmail.com
nixpkgs stable apache-tomcat 7.0.100 Potentially vulnerable - abcz2.uprola@gmail.com
nixpkgs unstable apache-tomcat 9.0.31 Potentially vulnerable - abcz2.uprola@gmail.com
nixpkgs unstable apache-tomcat 8.5.51 Potentially vulnerable - abcz2.uprola@gmail.com
nixpkgs unstable apache-tomcat 7.0.100 Potentially vulnerable - abcz2.uprola@gmail.com
Npackd Stable Tomcat 8.5.61 Development -
Npackd Stable Tomcat 8.5.60 Development -
Npackd Stable Tomcat 8.5.59 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.58 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.57 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.56 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.55 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.54 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.53 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.51 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.50 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.49 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.47 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.46 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.45 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.43 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.42 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.41 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.40 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.39 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.38 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.37 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.35 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.34 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.33 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.32 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.31 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.29 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.28 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.27 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.24 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.23 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.20 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.16 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.15 Potentially vulnerable Development -
Npackd Stable Tomcat 8.5.12 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.75 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.72 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.70 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.69 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.68 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.65 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.63 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.61 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.57 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.56 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.55 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.53 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.50 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.47 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.42 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.39 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.37 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.34 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.33 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.30 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.29 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.27 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.26 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.22 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.20 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.19 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.16 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.14 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.12 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.8 Potentially vulnerable Development -
Npackd Stable Tomcat 7.0.6 Potentially vulnerable Development -
Npackd Stable Tomcat 6.0.32 Potentially vulnerable Development -
Npackd Stable Tomcat 6.0.30 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.107 Development -
Npackd Stable64 Tomcat 64 bit 7.0.106 Development -
Npackd Stable64 Tomcat 64 bit 7.0.105 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.104 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.103 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.100 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.99 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.96 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.94 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.93 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.92 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.91 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.90 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.88 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.85 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.84 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.82 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.81 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.79 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.23 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.22 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.20 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.19 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.16 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.14 Potentially vulnerable Development -
Npackd Stable64 Tomcat 64 bit 7.0.12 Potentially vulnerable Development -
OpenBSD Ports www/tomcat/v9 9.0.40 www ports@openbsd.org
OpenBSD Ports www/tomcat/v9 9.0.40 www ports@openbsd.org
OpenBSD Ports www/tomcat/v9 9.0.40 www ports@openbsd.org
OpenBSD Ports www/tomcat/v8 8.5.60 www ports@openbsd.org
OpenBSD Ports www/tomcat/v8 8.5.60 www ports@openbsd.org
OpenBSD Ports www/tomcat/v8 8.5.60 www ports@openbsd.org
OpenBSD Ports www/tomcat/v7 7.0.106 www ports@openbsd.org
OpenBSD Ports www/tomcat/v7 7.0.106 www ports@openbsd.org
OpenBSD Ports www/tomcat/v7 7.0.106 www ports@openbsd.org
OpenIndiana packages
hipster
tomcat 8.5.59 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
tomcat 8.5.59 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
tomcat 8.5.59 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
tomcat 8.5.51 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
tomcat 8.5.51 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
tomcat 8.5.51 Potentially vulnerable Web Services/Application and Web Servers -
OpenMandriva 4.0
main/release
tomcat6 6.0.43 Potentially vulnerable Development/Java nobodydead@gmail.com
OpenMandriva 4.1
main/release
tomcat6 6.0.43 Potentially vulnerable Development/Java nobodydead@gmail.com
OpenMandriva Rolling
main/release
tomcat6 6.0.43 Potentially vulnerable Development/Java nobodydead@gmail.com
OpenMandriva Cooker
main/release
tomcat6 6.0.43 Potentially vulnerable Development/Java nobodydead@gmail.com
OpenPKG tomcat 9.0.41 Web -
openSUSE Leap 42.3
updates/oss
tomcat 8.0.53 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
tomcat 8.0.53 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
tomcat 8.0.53 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
tomcat 8.0.50 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
main/oss
tomcat 8.0.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
tomcat 8.0.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
tomcat 9.0.21 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
tomcat 9.0.20 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
tomcat 9.0.12 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
main/oss
tomcat 9.0.5 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.35 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.35 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.31 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.30 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.30 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
tomcat 9.0.21 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
main/oss
tomcat 9.0.14 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
main/oss
tomcat 9.0.35 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Tumbleweed tomcat 9.0.36 Potentially vulnerable Productivity/Networking/Web/Servers -
Parabola
extra
tomcat9 9.0.41 - -
Parabola
extra
tomcat8 8.5.61 - -
Parabola
extra
tomcat7 7.0.107 - -
Pardus 17
main
tomcat8 8.5.14 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Pardus 17
updates/main
tomcat8 8.5.14 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Pardus 17
updates/main
tomcat8 8.5.14 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Pardus 17
main
tomcat7 7.0.75 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Pardus 19
main
tomcat9 9.0.31 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Pardus 19
updates/main
tomcat9 9.0.31 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Pardus 19
updates/main
tomcat9 9.0.31 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Pardus 19
main
tomcat9 9.0.16 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Pardus 19
main
tomcat9 9.0.16 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Pardus 19
main
tomcat8 8.5.38 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Parrot
main
tomcat9 9.0.41 misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Parrot
main
tomcat7 7.0.78 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
pkgsrc current www/apache-tomcat9 9.0.41 www ryoon@netbsd.org
pkgsrc current www/apache-tomcat85 8.5.61 www ryoon@netbsd.org
pkgsrc current www/apache-tomcat8 8.0.53 Potentially vulnerable www pkgsrc-users@netbsd.org
pkgsrc current www/apache-tomcat7 7.0.106 www pkgsrc-users@netbsd.org
pkgsrc current www/apache-tomcat6 6.0.45 Potentially vulnerable www pkgsrc-users@netbsd.org
pkgsrc current www/apache-tomcat55 5.5.35 Potentially vulnerable www pkgsrc-users@netbsd.org
PLD Linux tomcat 7.0.106 - -
PureOS Amber tomcat9 9.0.31 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
PureOS Amber tomcat8 8.5.38 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
PureOS landing tomcat9 9.0.41 misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Raspbian Oldstable
main
tomcat8 8.5.54 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Raspbian Oldstable
main
tomcat7 7.0.75 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Raspbian Oldstable
main
tomcat6 6.0.45 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, drazzib@debian.org, ebourg@apache.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Raspbian Stable
main
tomcat9 9.0.31 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Raspbian Stable
main
tomcat8 8.5.38 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Raspbian Stable
main
tomcat7 7.0.78 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Raspbian Stable
main
tomcat6 6.0.45 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, drazzib@debian.org, ebourg@apache.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Raspbian Testing
main
tomcat9 9.0.41 misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Raspbian Testing
main
tomcat8 8.5.38 Potentially vulnerable misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Raspbian Testing
main
tomcat7 7.0.78 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Raspbian Testing
main
tomcat6 6.0.45 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, drazzib@debian.org, ebourg@apache.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Rosa 2014.1
main/updates
tomcat 7.0.68 Potentially vulnerable - -
Rosa 2014.1
main/updates
tomcat 7.0.68 Potentially vulnerable - -
Rosa 2014.1
main/release
tomcat 7.0.47 Potentially vulnerable - -
Rosa 2014.1
main/release
tomcat6 6.0.37 Potentially vulnerable - -
Rosa 2014.1
main/release
tomcat5 5.5.35 Potentially vulnerable - -
Rosa 2016.1
main/updates
tomcat 7.0.90 Potentially vulnerable - -
Rosa 2016.1
main/release
tomcat 7.0.68 Potentially vulnerable - -
Rosa 2019.1
main/release
tomcat 9.0.37 Potentially vulnerable Development/Java m.novosyolov@rosalinux.ru
Rosa Server 6.9
base/release
tomcat6 6.0.24 Potentially vulnerable Networking/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
tomcat6 6.0.24 Potentially vulnerable Networking/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
tomcat6 6.0.24 Potentially vulnerable Networking/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
tomcat 7.0.69 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
tomcat 7.0.76 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
tomcat 7.0.69 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.76 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.69 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.69 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.69 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.54 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.54 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.54 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.42 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.42 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.42 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.42 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x tomcat 7.0.40 Potentially vulnerable System Environment/Daemons -
Scoop
extras
tomcat 9.0.41 - -
Scoop
versions
tomcat8 8.5.61 - -
Scoop
versions
tomcat7 7.0.107 - -
Scoop
versions
tomcat6 6.0.53 Potentially vulnerable - -
SlackBuilds system/apache-tomcat 7.0.103 Potentially vulnerable system pprkut@liwjatan.at
T2 SDE tomcat 6.0.26 Potentially vulnerable extra/server t2@t2-project.org
Trisquel 6.0
toutatis/main
tomcat7 7.0.26 Potentially vulnerable universe/java ubuntu-devel-discuss@lists.ubuntu.com, jakub.adam@ktknet.cz, james.page@ubuntu.com, miguel@miguel.cc, tmancill@debian.org
Trisquel 6.0
toutatis-updates/main
tomcat7 7.0.26 Potentially vulnerable universe/java ubuntu-devel-discuss@lists.ubuntu.com, jakub.adam@ktknet.cz, james.page@ubuntu.com, miguel@miguel.cc, tmancill@debian.org
Trisquel 6.0
toutatis/main
tomcat6 6.0.35 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, drazzib@debian.org, konqueror@gmx.de, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Trisquel 6.0
toutatis-updates/main
tomcat6 6.0.35 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, drazzib@debian.org, konqueror@gmx.de, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Trisquel 7.0
belenos/main
tomcat7 7.0.52 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, miguel@miguel.cc, tmancill@debian.org
Trisquel 7.0
belenos-updates/main
tomcat7 7.0.52 Potentially vulnerable java ubuntu-devel-discuss@lists.ubuntu.com, jakub.adam@ktknet.cz, james.page@ubuntu.com, miguel@miguel.cc, tmancill@debian.org
Trisquel 7.0
belenos/main
tomcat6 6.0.39 Potentially vulnerable universe/web pkg-java-maintainers@lists.alioth.debian.org, drazzib@debian.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Trisquel 7.0
belenos-updates/main
tomcat6 6.0.39 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, drazzib@debian.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Trisquel 8.0
flidas/main
tomcat8 8.0.32 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Trisquel 8.0
flidas-updates/main
tomcat8 8.0.32 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Trisquel 8.0
flidas/main
tomcat7 7.0.68 Potentially vulnerable universe/java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Trisquel 8.0
flidas-updates/main
tomcat7 7.0.68 Potentially vulnerable universe/java ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Trisquel 8.0
flidas/main
tomcat6 6.0.45 Potentially vulnerable universe/web pkg-java-maintainers@lists.alioth.debian.org, drazzib@debian.org, ebourg@apache.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Trisquel 8.0
flidas-updates/main
tomcat6 6.0.45 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, drazzib@debian.org, ebourg@apache.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Trisquel 9.0
etiona-updates/main
tomcat9 9.0.16 Potentially vulnerable universe/java ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, tmancill@debian.org
Trisquel 9.0
etiona-updates/main
tomcat8 8.5.39 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Trisquel 9.0
etiona/main
tomcat8 8.5.30 Potentially vulnerable universe/misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Trisquel 9.0
etiona/main
tomcat7 7.0.78 Potentially vulnerable universe/java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Ubuntu 12.04
precise/universe
tomcat7 7.0.26 Potentially vulnerable universe/java ubuntu-devel-discuss@lists.ubuntu.com, jakub.adam@ktknet.cz, james.page@ubuntu.com, miguel@miguel.cc, tmancill@debian.org
Ubuntu 12.04
precise-updates/universe
tomcat7 7.0.26 Potentially vulnerable universe/java ubuntu-devel-discuss@lists.ubuntu.com, jakub.adam@ktknet.cz, james.page@ubuntu.com, miguel@miguel.cc, tmancill@debian.org
Ubuntu 12.04
precise/main
tomcat6 6.0.35 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, drazzib@debian.org, konqueror@gmx.de, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Ubuntu 12.04
precise-updates/main
tomcat6 6.0.35 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, drazzib@debian.org, konqueror@gmx.de, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Ubuntu 14.04
trusty/main
tomcat7 7.0.52 Potentially vulnerable java pkg-java-maintainers@lists.alioth.debian.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, miguel@miguel.cc, tmancill@debian.org
Ubuntu 14.04
trusty-updates/main
tomcat7 7.0.52 Potentially vulnerable java ubuntu-devel-discuss@lists.ubuntu.com, jakub.adam@ktknet.cz, james.page@ubuntu.com, miguel@miguel.cc, tmancill@debian.org
Ubuntu 14.04
trusty/universe
tomcat6 6.0.39 Potentially vulnerable universe/web pkg-java-maintainers@lists.alioth.debian.org, drazzib@debian.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Ubuntu 14.04
trusty-updates/universe
tomcat6 6.0.39 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, drazzib@debian.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Ubuntu 16.04
xenial/main
tomcat8 8.0.32 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Ubuntu 16.04
xenial-updates/main
tomcat8 8.0.32 Potentially vulnerable misc ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Ubuntu 16.04
xenial/universe
tomcat7 7.0.68 Potentially vulnerable universe/java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Ubuntu 16.04
xenial-updates/universe
tomcat7 7.0.68 Potentially vulnerable universe/java ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Ubuntu 16.04
xenial/universe
tomcat6 6.0.45 Potentially vulnerable universe/web pkg-java-maintainers@lists.alioth.debian.org, drazzib@debian.org, ebourg@apache.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Ubuntu 16.04
xenial-updates/universe
tomcat6 6.0.45 Potentially vulnerable universe/web ubuntu-devel-discuss@lists.ubuntu.com, drazzib@debian.org, ebourg@apache.org, ludovic.claude@laposte.net, miguel@miguel.cc, tmancill@debian.org, twerner@debian.org
Ubuntu 18.04
bionic-updates/universe
tomcat9 9.0.16 Potentially vulnerable universe/java ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, tmancill@debian.org
Ubuntu 18.04
bionic-updates/universe
tomcat8 8.5.39 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Ubuntu 18.04
bionic/universe
tomcat8 8.5.30 Potentially vulnerable universe/misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, tmancill@debian.org
Ubuntu 18.04
bionic/universe
tomcat7 7.0.78 Potentially vulnerable universe/java pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, jakub.adam@ktknet.cz, james.page@ubuntu.com, nomadium@debian.org, tmancill@debian.org
Ubuntu 20.04
focal/universe
tomcat9 9.0.31 Potentially vulnerable universe/misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Ubuntu 20.04
focal-updates/universe
tomcat9 9.0.31 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com, ebourg@apache.org, tmancill@debian.org
Ubuntu 20.10
groovy/universe
tomcat9 9.0.37 Potentially vulnerable universe/misc pkg-java-maintainers@lists.alioth.debian.org, ebourg@apache.org, tmancill@debian.org
Void Linux x86_64
x86_64
apache-tomcat 9.0.38 Potentially vulnerable - maldridge@voidlinux.org
Void Linux x86_64
x86_64
apache-tomcat-doc 9.0.38 Potentially vulnerable - maldridge@voidlinux.org
Void Linux x86_64
x86_64
apache-tomcat-examples 9.0.38 Potentially vulnerable - maldridge@voidlinux.org
Void Linux x86_64
x86_64
apache-tomcat-host-manager 9.0.38 Potentially vulnerable - maldridge@voidlinux.org
Void Linux x86_64
x86_64
apache-tomcat-manager 9.0.38 Potentially vulnerable - maldridge@voidlinux.org
Wikidata Apache Tomcat 10.0.0 (beta) - -
Wikidata Apache Tomcat 9.0.41 - -
Wikidata Apache Tomcat 8.5.61 - -

Absent in repositories

  • Adélie Linux current
  • AIX Open Source Packages
  • AIX Toolbox
  • Alpine Linux 3.8
  • Alpine Linux 3.9
  • Alpine Linux 3.10
  • Alpine Linux 3.11
  • Alpine Linux 3.12
  • antiX-16
  • antiX-17
  • antiX-19
  • AOSC
  • AppGet
  • Arch Testing
  • Ataraxia Linux
  • BackBox 6
  • BackBox 7
  • BlackArch
  • Buckaroo
  • BunsenLabs Hydrogen
  • BunsenLabs Hydrogen/Jessie Backports
  • BunsenLabs Helium
  • BunsenLabs Helium/Stretch Backports
  • Calculate
  • Carbs Linux
  • CentOS 8
  • Chakra
  • Chakra Staging
  • Chakra Testing
  • Chaotic-AUR
  • ConanCenter
  • CPAN
  • MetaCPAN
  • CRAN
  • crates.io
  • CRUX 3.4
  • CRUX 3.5
  • CRUX 3.6
  • Cygwin
  • Deb Multimedia Unstable
  • distri
  • ELRepo el7
  • ELRepo el7 Testing
  • Entware
  • EPEL 7
  • EPEL 8
  • F-Droid
  • freshcode.club
  • Gentoo overlay GURU
  • Gentoo overlay Pentoo
  • Gentoo Science overlay
  • GNU Elpa
  • GoboLinux
  • Hackage
  • HaikuPorts master
  • Homebrew Casks
  • Homebrew tap Brewsci/bio
  • HP-UX 11.31
  • IBM i
  • just-install
  • KaOS
  • KaOS Build
  • KaOS kde-next
  • KDE neon Dev Stable
  • KDE neon Dev Unstable
  • KDE neon User
  • KDE neon User LTS
  • KISS Linux Community
  • KISS Linux Games
  • KISS Linux Main
  • Kwort 4.3.2
  • Kwort 4.3.3
  • Kwort 4.3.4
  • Libregamewiki
  • Linux Mint 17
  • Linux Mint 17.1
  • Linux Mint 17.2
  • Linux Mint 17.3
  • Linux Mint 18
  • Linux Mint 18.1
  • Linux Mint 18.2
  • Linux Mint 18.3
  • Linux Mint 19
  • Linux Mint 19.1
  • Linux Mint 19.2
  • Linux Mint 19.3
  • Linux Mint 20.0
  • Linux Mint 20.1
  • LMDE 4
  • LuaRocks
  • MacPorts
  • Maemo Fremantle
  • MELPA
  • MSYS2 mingw
  • MSYS2 msys2
  • MX Linux MX-15
  • MX Linux MX-15 Testing
  • MX Linux MX-16
  • MX Linux MX-17
  • MX Linux MX-17 Testing
  • MX Linux MX-19
  • MX Linux MX-19 Testing
  • NeuroDebian data
  • NeuroDebian Debian 8
  • NeuroDebian Debian 9
  • NeuroDebian Debian 10
  • NeuroDebian Debian Unstable
  • NeuroDebian Ubuntu 14.04
  • NeuroDebian Ubuntu 16.04
  • NeuroDebian Ubuntu 18.04
  • NeuroDebian Ubuntu 19.04
  • Npackd Unstable
  • openEuler 20.03
  • openSUSE Education Tumbleweed
  • openSUSE Emulators Tumbleweed
  • openSUSE Games Tumbleweed
  • openSUSE Graphics Tumbleweed
  • openSUSE Hardware:SDR Tumbleweed
  • openSUSE Multimedia:Apps Tumbleweed
  • openSUSE Multimedia:Libs Tumbleweed
  • openSUSE Network Tumbleweed
  • openSUSE Science Tumbleweed
  • openSUSE Security Tumbleweed
  • OpenWrt 17.01 x86_64
  • OpenWrt 18.06 x86_64
  • OpenWrt 19.07 x86_64
  • OS4Depot
  • PackMan openSUSE Leap 42.3
  • PackMan openSUSE Leap 15.0
  • PackMan openSUSE Leap 15.1
  • PackMan openSUSE Leap 15.2
  • PackMan openSUSE Tumbleweed
  • PackMan SLE 12
  • PackMan SLE 15
  • Parabola Testing
  • PCLinuxOS
  • Pisi Linux
  • Pisi Linux Contrib
  • PyPI
  • Ravenports
  • ReactOS rapps
  • RebornOS
  • RPM Fusion EL 6
  • RPM Fusion EL 7
  • RPM Fusion EL 8
  • RPM Fusion Fedora 28
  • RPM Fusion Fedora 29
  • RPM Fusion Fedora 30
  • RPM Fusion Fedora 31
  • RPM Fusion Fedora Rawhide
  • RPM Sphere
  • RubyGems
  • Sabayon
  • Sabayon for-gentoo
  • Salix 14.2
  • Siduction
  • Siduction Experimental
  • Slackware 14.2
  • Slackware current
  • Slackware64 14.2
  • Slackware64 current
  • Slackwarearm 14.2
  • Slackwarearm current
  • SliTaz Cooking
  • SliTaz Next
  • Solus
  • Sparky Stable
  • Sparky Testing
  • Stackage LTS Haskell
  • Stackage Nightly
  • Tails stable
  • Tails devel
  • Termux
  • Trisquel 6.0 backports
  • Trisquel 7.0 backports
  • Trisquel 8.0 backports
  • Trisquel 9.0 backports
  • Ubuntu 12.04 Backports
  • Ubuntu 14.04 Backports
  • Ubuntu 16.04 Backports
  • Ubuntu 18.04 Backports
  • Ubuntu 20.04 Proposed
  • Ubuntu 20.10 Proposed
  • UnitedRPMs Fedora 30
  • UnitedRPMs Fedora 31
  • UnitedRPMs Fedora 32
  • UnitedRPMs Fedora 33
  • Vcpkg
  • winget
  • YACP