Page 5 of 22 results (0.006 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp. • http://marc.info/?l=bugtraq&m=95371672300045&w=2 http://www.iss.net/security_center/static/4205.php •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0). • https://www.exploit-db.com/exploits/20716 http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html http://www.osvdb.org/5580 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0112-004 https://exchange.xforce.ibmcloud.com/vulnerabilities/6971 •