Page 35 of 175 results (0.007 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Jakarta Tomcat 4.0.1 allows remote attackers to reveal physical path information by requesting a long URL with a .JSP extension. • http://marc.info/?l=bugtraq&m=100654722925155&w=2 http://marc.info/?l=tomcat-dev&m=100658457507305&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/7599 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0). • https://www.exploit-db.com/exploits/20716 http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html http://www.osvdb.org/5580 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0112-004 https://exchange.xforce.ibmcloud.com/vulnerabilities/6971 •

CVSS: 6.4EPSS: 15%CPEs: 1EXPL: 2

Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path. • https://www.exploit-db.com/exploits/20131 http://www.iss.net/security_center/static/4967.php http://www.securityfocus.com/bid/1531 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26date%3D2000-07-15%26msg%3DPine.SUN.3.96.1000719184401.17782A-100000%40grex.cyberspace.org •

CVSS: 6.4EPSS: 4%CPEs: 2EXPL: 2

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension. • https://www.exploit-db.com/exploits/20132 http://www.securityfocus.com/bid/1532 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26date%3D2000-07-15%26msg%3DPine.SUN.3.96.1000719235404.24004A-100000%40grex.cyberspace.org •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0309.html http://www.securityfocus.com/bid/1548 https://exchange.xforce.ibmcloud.com/vulnerabilities/5160 •