CVE-2002-2007 – Apache Tomcat 3.2.3/3.2.4 - 'RealPath.jsp' Information Disclosuree
https://notcve.org/view.php?id=CVE-2002-2007
The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages. • https://www.exploit-db.com/exploits/21492 https://www.exploit-db.com/exploits/21490 https://www.exploit-db.com/exploits/21491 http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html http://www.iss.net/security_center/static/9208.php http://www.kb.cert.org/vuls/id/116963 http://www.procheckup.com/security_info/vuln_pr0205.html http://www.procheckup.com/security_info/vuln_pr0206.html http: •
CVE-2002-2008
https://notcve.org/view.php?id=CVE-2002-2008
Apache Tomcat 4.0.3 for Windows allows remote attackers to obtain the web root path via an HTTP request for a resource that does not exist, such as lpt9, which leaks the information in an error message. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0225.html http://tomcat.apache.org/security-4.html http://www.iss.net/security_center/static/9394.php http://www.securityfocus.com/bid/5054 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev. •
CVE-2002-1148 – Apache Tomcat 3/4 - 'DefaultServlet' File Disclosure
https://notcve.org/view.php?id=CVE-2002-1148
The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet. El servlet por defecto (org.apache.catalina.servlets.DefaultServlet) en Tomcat 4.0.4 y 4.1.10 permite a atacantes remotos leer código fuente de ficheros del servidor mediante una petición directa al servlet. • https://www.exploit-db.com/exploits/21853 http://marc.info/?l=bugtraq&m=103288242014253&w=2 http://online.securityfocus.com/advisories/4758 http://www.debian.org/security/2002/dsa-170 http://www.iss.net/security_center/static/10175.php http://www.redhat.com/support/errata/RHSA-2002-217.html http://www.redhat.com/support/errata/RHSA-2002-218.html http://www.securityfocus.com/bid/5786 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev. •
CVE-2002-0935
https://notcve.org/view.php?id=CVE-2002-0935
Apache Tomcat 4.0.3, and possibly other versions before 4.1.3 beta, allows remote attackers to cause a denial of service (resource exhaustion) via a large number of requests to the server with null characters, which causes the working threads to hang. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0120.html http://online.securityfocus.com/archive/1/277940 http://www.iss.net/security_center/static/9396.php http://www.osvdb.org/5051 http://www.securityfocus.com/bid/5067 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rb71997f5 •
CVE-2002-0936 – Apache Tomcat 3/4 - JSP Engine Denial of Service
https://notcve.org/view.php?id=CVE-2002-0936
The Java Server Pages (JSP) engine in Tomcat allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null). • https://www.exploit-db.com/exploits/21534 http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html http://tomcat.apache.org/security-4.html http://www.iss.net/security_center/static/9339.php http://www.securityfocus.com/bid/4995 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html •