Page 5 of 42 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 81EXPL: 2

13 Jan 2010 — Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the ... • http://www.securityfocus.com/archive/1/508830/100/0/threaded • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 28%CPEs: 332EXPL: 2

05 May 2009 — Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI. Una vulnerabilidad de salto directorio en el servidor HTTP en Mort Bay Jetty versión 5.1.14, versiones 6.x anteriores a 6.1.17, y versiones 7.x hasta 7.0.0.M2, permite a los atacantes remotos acceder a archivos arbitrarios por medio de secuencias de salto de directorio en el URI. • https://www.exploit-db.com/exploits/36318 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •