CVE-2001-1512
https://notcve.org/view.php?id=CVE-2001-1512
Unknown vulnerability in Allaire JRun 3.1 allows remote attackers to directly access the WEB-INF and META-INF directories and execute arbitrary JavaServer Pages (JSP), a variant of CVE-2000-1050. • http://www.iss.net/security_center/static/7677.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22287 http://www.securityfocus.com/bid/3662 •
CVE-2001-1544
https://notcve.org/view.php?id=CVE-2001-1544
Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request. • http://www.iss.net/security_center/static/7678.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22290&Method=Full http://www.securityfocus.com/bid/3666 •
CVE-2001-1513
https://notcve.org/view.php?id=CVE-2001-1513
Macromedia JRun 3.0 and 3.1 allows remote attackers to obtain duplicate active user session IDs and perform actions as other users via a URL request for the web application directory without the trailing '/' (slash), as demonstrated using ctx. • http://www.iss.net/security_center/static/7680.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22260&Method=Full http://www.securityfocus.com/bid/3600 •
CVE-2001-1514
https://notcve.org/view.php?id=CVE-2001-1514
ColdFusion 4.5 and 5, when running on Windows with the advanced security sandbox type set to "operating system," does not properly pass security context to (1) child processes created with <CFEXECUTE> and (2) child processes that call the CreateProcess function and are executed with <CFOBJECT> or end with the CFX extension, which allows attackers to execute programs with the permissions of the System account. • http://www.macromedia.com/v1/Handlers/index.cfm?ID=22263 •
CVE-2001-0926
https://notcve.org/view.php?id=CVE-2001-0926
SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request's body has an #include statement. • http://marc.info/?l=bugtraq&m=100697797325013&w=2 http://www.macromedia.com/v1/handlers/index.cfm?ID=22261&Method=Full http://www.securityfocus.com/bid/3589 https://exchange.xforce.ibmcloud.com/vulnerabilities/7622 •