Page 4 of 34 results (0.014 seconds)

CVSS: 7.5EPSS: 21%CPEs: 1EXPL: 2

02 Aug 2001 — Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0). • https://www.exploit-db.com/exploits/20716 •

CVSS: 6.4EPSS: 39%CPEs: 1EXPL: 2

21 Sep 2000 — Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path. • https://www.exploit-db.com/exploits/20131 •

CVSS: 7.5EPSS: 53%CPEs: 2EXPL: 2

21 Sep 2000 — The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension. • https://www.exploit-db.com/exploits/20132 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 1

20 Jul 2000 — The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0309.html •