Page 2 of 19 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL. • http://www.iss.net/security_center/static/10570.php http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500 http://www.securityfocus.com/bid/6126 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unknown "file disclosure" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact. • http://www.iss.net/security_center/static/10571.php http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500 http://www.securityfocus.com/bid/6125 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name. Desbordamiento de búfer basado en el montón (heap) en el mecanismo de manejo de errores en el manejador de IIS ISAPI en Macromedia JRun 4.0 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante una peticón HTTP GET con un nombre de fichero .jsp largo. • http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html http://marc.info/?l=bugtraq&r=1&b=200211&w=2 http://www.eeye.com/html/Research/Advisories/AD20021112.html http://www.securityfocus.com/bid/6122 https://exchange.xforce.ibmcloud.com/vulnerabilities/10568 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html http://online.securityfocus.com/archive/1/280062 http://www.iss.net/security_center/static/9459.php http://www.macromedia.com/v1/handlers/index.cfm?ID=23164 http://www.osvdb.org/5028 http://www.securityfocus.com/bid/5134 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 2

The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null). • https://www.exploit-db.com/exploits/21536 http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html http://www.iss.net/security_center/static/9339.php http://www.securityfocus.com/bid/4997 •