CVE-2002-2272 – Apache 1.3.x + Tomcat 4.0.x/4.1.x mod_jk - Chunked Encoding Denial of Service
https://notcve.org/view.php?id=CVE-2002-2272
Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 through 1.3.27, allows remote attackers to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values. • https://www.exploit-db.com/exploits/22068 http://archives.neohapsis.com/archives/bugtraq/2002-12/0045.html http://www.securityfocus.com/bid/6320 https://exchange.xforce.ibmcloud.com/vulnerabilities/10771 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2002-1895
https://notcve.org/view.php?id=CVE-2002-1895
The servlet engine in Jakarta Apache Tomcat 3.3 and 4.0.4, when using IIS and the ajp1.3 connector, allows remote attackers to cause a denial of service (crash) via a large number of HTTP GET requests for an MS-DOS device such as AUX, LPT1, CON, or PRN. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0020.html http://tomcat.apache.org/security-4.html http://www.iss.net/security_center/static/10348.php https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E •
CVE-2002-2009
https://notcve.org/view.php?id=CVE-2002-2009
Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) </, and (4) %20/, which leaks the pathname in an error message. • http://tomcat.apache.org/security-4.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-04/0286.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-04/0297.html http://www.securityfocus.com/bid/4557 https://exchange.xforce.ibmcloud.com/vulnerabilities/42915 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.or •
CVE-2002-2007 – Apache Tomcat 3.2.3/3.2.4 - 'RealPath.jsp' Information Disclosuree
https://notcve.org/view.php?id=CVE-2002-2007
The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages. • https://www.exploit-db.com/exploits/21492 https://www.exploit-db.com/exploits/21490 https://www.exploit-db.com/exploits/21491 http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html http://www.iss.net/security_center/static/9208.php http://www.kb.cert.org/vuls/id/116963 http://www.procheckup.com/security_info/vuln_pr0205.html http://www.procheckup.com/security_info/vuln_pr0206.html http: •
CVE-2002-2008
https://notcve.org/view.php?id=CVE-2002-2008
Apache Tomcat 4.0.3 for Windows allows remote attackers to obtain the web root path via an HTTP request for a resource that does not exist, such as lpt9, which leaks the information in an error message. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0225.html http://tomcat.apache.org/security-4.html http://www.iss.net/security_center/static/9394.php http://www.securityfocus.com/bid/5054 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev. •