Page 6 of 56 results (0.007 seconds)

CVSS: 7.8EPSS: 12%CPEs: 36EXPL: 2

31 Dec 2002 — Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 through 1.3.27, allows remote attackers to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values. • https://www.exploit-db.com/exploits/22068 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 39%CPEs: 19EXPL: 2

11 Oct 2002 — The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet. El servlet por defecto (org.apache.catalina.servlets.DefaultServlet) en Tomcat 4.0.4 y 4.1.10 permite a atacantes remotos leer código fuente de ficheros del servidor mediante una petición directa al servlet. • https://www.exploit-db.com/exploits/21853 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

04 Oct 2002 — Apache Tomcat 4.0.3, and possibly other versions before 4.1.3 beta, allows remote attackers to cause a denial of service (resource exhaustion) via a large number of requests to the server with null characters, which causes the working threads to hang. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0120.html •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 2

31 Aug 2002 — The Java Server Pages (JSP) engine in Tomcat allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null). • https://www.exploit-db.com/exploits/21534 •

CVSS: 7.5EPSS: 68%CPEs: 1EXPL: 1

23 Jul 2002 — Cross-site scripting vulnerability in Apache Tomcat 4.0.3 allows remote attackers to execute script as other web users via script in a URL with the /servlet/ mapping, which does not filter the script when an exception is thrown by the servlet. Vulnerabilidad de secuencias de comandos en sitios cruzados (cross-site scripting) en Apache Tomcat 4.0.3 permite a atacantes remotos ejecutar secuencias de comandos como otro usuario web mediante un script en la URL mapeado a /servlet/, que no filtra el script cuando... • https://www.exploit-db.com/exploits/21604 •

CVSS: 5.3EPSS: 1%CPEs: 1EXPL: 0

22 Nov 2001 — Jakarta Tomcat 4.0.1 allows remote attackers to reveal physical path information by requesting a long URL with a .JSP extension. • http://marc.info/?l=bugtraq&m=100654722925155&w=2 •