Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2007-6672
Mortbay Jetty 6.1.5 and 6.1.6 allows remote attackers to bypass protection mechanisms and read the source of files via multiple '/' (slash) characters in the URI.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.006
EPSS Ranking
69.0%
CVSS Severity
CVSS v2 Score
5.0
References
http://jira.codehaus.org/browse/JETTY-386#action_117699
http://jira.codehaus.org/browse/JETTY/fixforversion/13950
http://osvdb.org/39855
http://secunia.com/advisories/28322
http://secunia.com/advisories/28547
http://www.igniterealtime.org/community/message/163752
http://www.kb.cert.org/vuls/id/553235
http://www.securityfocus.com/bid/27117
http://www.vupen.com/english/advisories/2008/0079
http://jira.codehaus.org/browse/JETTY-386#action_117699
http://jira.codehaus.org/browse/JETTY/fixforversion/13950
http://osvdb.org/39855
http://secunia.com/advisories/28322
http://secunia.com/advisories/28547
http://www.igniterealtime.org/community/message/163752
http://www.kb.cert.org/vuls/id/553235
http://www.securityfocus.com/bid/27117
http://www.vupen.com/english/advisories/2008/0079
Products affected by CVE-2007-6672
Mortbay Jetty
»
Jetty
»
Version:
6.1.5
cpe:2.3:a:mortbay_jetty:jetty:6.1.5
Mortbay Jetty
»
Jetty
»
Version:
6.1.6
cpe:2.3:a:mortbay_jetty:jetty:6.1.6
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved