Search for vulnerabilities
Vulnerability ID | VCID-8xq4-qp4b-aaah |
Aliases |
CVE-2002-2007
|
Summary | The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 6.2 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Data source | Exploit-DB |
---|---|
Date added | May 29, 2002 |
Description | Apache Tomcat 3.2.3/3.2.4 - Example Files Web Root Full Path Disclosure |
Ransomware campaign use | Known |
Source publication date | May 29, 2002 |
Exploit type | remote |
Platform | multiple |
Source update date | Sept. 23, 2012 |
Source URL | https://www.securityfocus.com/bid/4877/info |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.65221 |
EPSS Score | 0.00248 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |