Apache

Tomcat

238 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.69%
  • Veröffentlicht 22.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.

  • EPSS 4.98%
  • Veröffentlicht 31.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unknown vulnerability in Tomcat 3.2.1 running on HP Secure OS for Linux 1.0 allows attackers to access servlet resources. NOTE: due to the vagueness of the vendor advisory, it is not clear whether this issue is already covered by other CVE identifie...

Exploit
  • EPSS 0.99%
  • Veröffentlicht 06.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message.

  • EPSS 3.43%
  • Veröffentlicht 22.11.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Jakarta Tomcat 4.0.1 allows remote attackers to reveal physical path information by requesting a long URL with a .JSP extension.

Exploit
  • EPSS 21.84%
  • Veröffentlicht 02.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).

Exploit
  • EPSS 39.82%
  • Veröffentlicht 20.10.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path.

Exploit
  • EPSS 43.44%
  • Veröffentlicht 20.10.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.

Exploit
  • EPSS 3.16%
  • Veröffentlicht 20.07.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.