Page 7 of 34 results (0.242 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp. • http://marc.info/?l=bugtraq&m=95371672300045&w=2 http://www.iss.net/security_center/static/4205.php •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0). • https://www.exploit-db.com/exploits/20716 http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html http://www.osvdb.org/5580 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0112-004 https://exchange.xforce.ibmcloud.com/vulnerabilities/6971 •

CVSS: 6.4EPSS: 4%CPEs: 2EXPL: 2

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension. • https://www.exploit-db.com/exploits/20132 http://www.securityfocus.com/bid/1532 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26date%3D2000-07-15%26msg%3DPine.SUN.3.96.1000719235404.24004A-100000%40grex.cyberspace.org •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0309.html http://www.securityfocus.com/bid/1548 https://exchange.xforce.ibmcloud.com/vulnerabilities/5160 •