3 results (0.013 seconds)

CVSS: 7.5EPSS: 1%CPEs: 21EXPL: 0

Unspecified vulnerability in Jetty HTTP Server, as used in (1) IBM Trading Partner Interchange before 4.2.4, (2) CA Unicenter Web Services Distributed Management (WSDM) before 3.11, and possibly other products, allows remote attackers to read arbitrary files via a .. (dot dot) in the URL. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049846.html http://secunia.com/advisories/12703 http://secunia.com/advisories/22229 http://securitytracker.com/id?1011545 http://securitytracker.com/id?1016975 http://www-1.ibm.com/support/docview.wss?uid=swg21178665 http://www.osvdb.org/10490 http://www.securityfocus.com/archive/1/447648/100/0/threaded http://www.securityfocus.com/bid/11330 http://www.vupen.com/english/advisories/2006/3873 https://exchange •

CVSS: 5.0EPSS: 1%CPEs: 67EXPL: 0

HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length. • http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&r2=1.76 http://secunia.com/advisories/11166 http://sourceforge.net/project/shownotes.php?release_id=224743 http://www.osvdb.org/4387 http://www.securityfocus.com/bid/9917 https://exchange.xforce.ibmcloud.com/vulnerabilities/15537 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Directory traversal vulnerability in the CGIServlet for Jetty HTTP server before 4.1.0 allows remote attackers to execute arbitrary commands via ..\ (dot-dot backslash) sequences in an HTTP request to the cgi-bin directory. Vulnerabilidad de atravesamiento de directorios en el CGIServlet en Jetty HHTP server anteriores a 4.1.0 permite a atacantes remotos leer ficheros arbitrarios mediante secuencias .. (punto punto barra invertida) en peticiones HTTP al directorio cgi-bin. • https://www.exploit-db.com/exploits/21895 http://groups.yahoo.com/group/jetty-announce/message/45 http://marc.info/?l=bugtraq&m=103358725813039&w=2 http://www.iss.net/security_center/static/10246.php http://www.securityfocus.com/bid/5852 http://www.westpoint.ltd.uk/advisories/wp-02-0011.txt •