Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.
https://exchange.xforce.ibmcloud.com/vulnerabilities/11194
http://www.securityfocus.com/bid/6721
http://www.securityfocus.com/advisories/5111
http://www.debian.org/security/2003/dsa-246
http://www.ciac.org/ciac/bulletins/n-060.shtml
http://secunia.com/advisories/7977
http://secunia.com/advisories/7972
http://marc.info/?l=bugtraq&m=104394568616290&w=2
http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/RELEASE-NOTES-3.3.1a.txt
http://jakarta.apache.org/builds/jakarta-tomcat/release/v3.3.1a/