Page 2 of 13 results (0.004 seconds)

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

CRLF injection vulnerability in Mortbay Jetty before 6.1.6rc0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Vulnerabilidad de inyección de retorno de carro y salto de línea (CRLF) en Mortbay Jetty anterior a 6.1.6rc0 permite a atacantes remotos inyectar cabeceras HTTP de su elección y llevar a cabo ataques de división de respuesta HTTP mediante vectores no especificados. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html http://osvdb.org/42495 http://secunia.com/advisories/27925 http://secunia.com/advisories/30941 http://secunia.com/advisories/35143 http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt http://www.kb.cert.org/vuls/id/212984 http://www.securityfocus.com/bid/26696 https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html https://www.redhat.com/archives/fedora-package-announce/2008- • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 14%CPEs: 13EXPL: 0

Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks. Jetty anterior al 4.2.27, 5.1 anterior al 5.1.12, 6.0 anterior al 6.0.2 y 6.1 anterior al 6.1.0pre3 genera identificadores de sesión predecibles utilizando java.util.random, lo que hace más fácil para atacantes remotos el adivinar los identificadores de sesiones utilizando ataques de fuerza bruta y, posiblemente, llevar a cabo ataques de falsificación de petición en sitios cruzados. • http://archives.neohapsis.com/archives/bugtraq/2007-02/0070.html http://fisheye.codehaus.org/changelog/jetty/?cs=1274 http://osvdb.org/33108 http://secunia.com/advisories/24070 http://www.securityfocus.com/archive/1/459164/100/0/threaded http://www.securityfocus.com/bid/22405 http://www.vupen.com/english/advisories/2007/0497 https://exchange.xforce.ibmcloud.com/vulnerabilities/32240 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary script source code via a capital P in the .jsp extension, and probably other mixed case manipulations. • http://securitytracker.com/id?1016168 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

Directory traversal vulnerability in jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary files via a %2e%2e%5c (encoded ../) in the URL. NOTE: this might be the same issue as CVE-2005-3747. • https://www.exploit-db.com/exploits/18571 http://securitytracker.com/id?1016168 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 1%CPEs: 21EXPL: 0

Unspecified vulnerability in Jetty HTTP Server, as used in (1) IBM Trading Partner Interchange before 4.2.4, (2) CA Unicenter Web Services Distributed Management (WSDM) before 3.11, and possibly other products, allows remote attackers to read arbitrary files via a .. (dot dot) in the URL. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049846.html http://secunia.com/advisories/12703 http://secunia.com/advisories/22229 http://securitytracker.com/id?1011545 http://securitytracker.com/id?1016975 http://www-1.ibm.com/support/docview.wss?uid=swg21178665 http://www.osvdb.org/10490 http://www.securityfocus.com/archive/1/447648/100/0/threaded http://www.securityfocus.com/bid/11330 http://www.vupen.com/english/advisories/2006/3873 https://exchange •