Page 7 of 34 results (0.013 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0). • https://www.exploit-db.com/exploits/20716 http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html http://www.osvdb.org/5580 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0112-004 https://exchange.xforce.ibmcloud.com/vulnerabilities/6971 •

CVSS: 6.4EPSS: 15%CPEs: 1EXPL: 2

Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path. • https://www.exploit-db.com/exploits/20131 http://www.iss.net/security_center/static/4967.php http://www.securityfocus.com/bid/1531 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26date%3D2000-07-15%26msg%3DPine.SUN.3.96.1000719184401.17782A-100000%40grex.cyberspace.org •

CVSS: 6.4EPSS: 4%CPEs: 2EXPL: 2

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension. • https://www.exploit-db.com/exploits/20132 http://www.securityfocus.com/bid/1532 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26date%3D2000-07-15%26msg%3DPine.SUN.3.96.1000719235404.24004A-100000%40grex.cyberspace.org •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0309.html http://www.securityfocus.com/bid/1548 https://exchange.xforce.ibmcloud.com/vulnerabilities/5160 •