Page 41 of 209 results (0.008 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Cross-site scripting vulnerability in Apache Tomcat 4.0.3 allows remote attackers to execute script as other web users via script in a URL with the /servlet/ mapping, which does not filter the script when an exception is thrown by the servlet. Vulnerabilidad de secuencias de comandos en sitios cruzados (cross-site scripting) en Apache Tomcat 4.0.3 permite a atacantes remotos ejecutar secuencias de comandos como otro usuario web mediante un script en la URL mapeado a /servlet/, que no filtra el script cuando una excepción es lanzada por el servelt (throw exception de Java) • https://www.exploit-db.com/exploits/21604 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0014.html http://marc.info/?l=bugtraq&m=102631703811297&w=2 http://www.osvdb.org/4973 http://www.securityfocus.com/bid/5193 https://exchange.xforce.ibmcloud.com/vulnerabilities/9520 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp. • http://marc.info/?l=bugtraq&m=95371672300045&w=2 http://www.iss.net/security_center/static/4205.php •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Unknown vulnerability in Tomcat 3.2.1 running on HP Secure OS for Linux 1.0 allows attackers to access servlet resources. NOTE: due to the vagueness of the vendor advisory, it is not clear whether this issue is already covered by other CVE identifiers. • http://archives.neohapsis.com/archives/hp/2001-q4/0062.html https://exchange.xforce.ibmcloud.com/vulnerabilities/42892 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 1

A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme http://www.securityfocus.com/bid/2982 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Jakarta Tomcat 4.0.1 allows remote attackers to reveal physical path information by requesting a long URL with a .JSP extension. • http://marc.info/?l=bugtraq&m=100654722925155&w=2 http://marc.info/?l=tomcat-dev&m=100658457507305&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/7599 https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E •