Page 10 of 98 results (2.015 seconds)

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

22 Mar 2002 — Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp. • http://marc.info/?l=bugtraq&m=95371672300045&w=2 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

31 Dec 2001 — Unknown vulnerability in Tomcat 3.2.1 running on HP Secure OS for Linux 1.0 allows attackers to access servlet resources. NOTE: due to the vagueness of the vendor advisory, it is not clear whether this issue is already covered by other CVE identifiers. • http://archives.neohapsis.com/archives/hp/2001-q4/0062.html •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

22 Nov 2001 — A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html •

CVSS: 5.3EPSS: 1%CPEs: 1EXPL: 0

22 Nov 2001 — Jakarta Tomcat 4.0.1 allows remote attackers to reveal physical path information by requesting a long URL with a .JSP extension. • http://marc.info/?l=bugtraq&m=100654722925155&w=2 •

CVSS: 7.5EPSS: 21%CPEs: 1EXPL: 2

02 Aug 2001 — Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0). • https://www.exploit-db.com/exploits/20716 •

CVSS: 6.4EPSS: 39%CPEs: 1EXPL: 2

21 Sep 2000 — Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path. • https://www.exploit-db.com/exploits/20131 •

CVSS: 7.5EPSS: 53%CPEs: 2EXPL: 2

21 Sep 2000 — The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension. • https://www.exploit-db.com/exploits/20132 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 1

20 Jul 2000 — The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0309.html •