
CVE-2002-1855
https://notcve.org/view.php?id=CVE-2002-1855
31 Dec 2002 — Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF."). • http://online.securityfocus.com/archive/1/279582 •

CVE-2002-2186
https://notcve.org/view.php?id=CVE-2002-2186
31 Dec 2002 — Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL. • http://www.iss.net/security_center/static/10570.php •

CVE-2002-2187
https://notcve.org/view.php?id=CVE-2002-2187
31 Dec 2002 — Unknown "file disclosure" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact. • http://www.iss.net/security_center/static/10571.php •

CVE-2002-1310
https://notcve.org/view.php?id=CVE-2002-1310
21 Nov 2002 — Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name. Desbordamiento de búfer basado en el montón (heap) en el mecanismo de manejo de errores en el manejador de IIS ISAPI en Macromedia JRun 4.0 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante una peticón HTTP GET con un nombre de fichero .jsp largo. • http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html •

CVE-2002-1025
https://notcve.org/view.php?id=CVE-2002-1025
04 Oct 2002 — JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html •

CVE-2002-0937 – Macromedia JRun 3/4 JSP Engine - Denial of Service
https://notcve.org/view.php?id=CVE-2002-0937
31 Aug 2002 — The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null). • https://www.exploit-db.com/exploits/21536 •

CVE-2002-0801
https://notcve.org/view.php?id=CVE-2002-0801
12 Aug 2002 — Buffer overflow in the ISAPI DLL filter for Macromedia JRun 3.1 allows remote attackers to execute arbitrary code via a direct request to the filter with a long HTTP host header field in a URL for a .jsp file. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0085.html •

CVE-2002-0665 – Macromedia JRun 3/4 - Administrative Authentication Bypass
https://notcve.org/view.php?id=CVE-2002-0665
11 Jul 2002 — Macromedia JRun Administration Server allows remote attackers to bypass authentication on the login form via an extra slash (/) in the URL. Macromedia JRun Administration Server permite a atacantes remotos evitar la autenticación para entrar en el sistema, mediante un caracter '/' extra en la URL. • https://www.exploit-db.com/exploits/21582 •

CVE-2001-1510
https://notcve.org/view.php?id=CVE-2001-1510
31 Dec 2001 — Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) "%3f.jsp", (2) "?.jsp" or (3) "?" to the requested URL. • http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2 •

CVE-2001-1511
https://notcve.org/view.php?id=CVE-2001-1511
31 Dec 2001 — JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) "jsp%00" or (2) "js%2570". • http://www.iss.net/security_center/static/7676.php •