22 results (0.001 seconds)

CVSS: 6.1EPSS: 3%CPEs: 3EXPL: 0

31 Dec 2004 — Cross-site scripting (XSS) vulnerability in the Management Console in JRun 4.0 allows remote attackers to execute arbitrary web script or HTML and possibly hijack a user's session. • http://marc.info/?l=bugtraq&m=109621995623823&w=2 •

CVSS: 8.1EPSS: 7%CPEs: 12EXPL: 0

31 Dec 2004 — JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user's HTTP session. • http://marc.info/?l=bugtraq&m=109621995623823&w=2 •

CVSS: 10.0EPSS: 70%CPEs: 5EXPL: 0

19 Nov 2004 — Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields. Desbordamiento de búfer en la función WriteToLog de los conectores web JRun 3.0 a 4.0, como mod_jrun y mod_jrun20 para Apache con registro verboso activado, permite a atacantes remotos ejecutar código de su elección mediante una u... • http://secunia.com/advisories/12647 •

CVSS: 9.1EPSS: 33%CPEs: 11EXPL: 0

05 Oct 2004 — The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in ";.cfm". • http://marc.info/?l=bugtraq&m=109621995623823&w=2 •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2002 — Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF."). • http://online.securityfocus.com/archive/1/279582 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2002 — Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL. • http://www.iss.net/security_center/static/10570.php •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2002 — Unknown "file disclosure" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact. • http://www.iss.net/security_center/static/10571.php •

CVSS: 9.8EPSS: 7%CPEs: 1EXPL: 1

21 Nov 2002 — Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name. Desbordamiento de búfer basado en el montón (heap) en el mecanismo de manejo de errores en el manejador de IIS ISAPI en Macromedia JRun 4.0 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante una peticón HTTP GET con un nombre de fichero .jsp largo. • http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 1

04 Oct 2002 — JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 2

31 Aug 2002 — The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null). • https://www.exploit-db.com/exploits/21536 •