Page 4 of 22 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request. • http://www.iss.net/security_center/static/7678.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22290&Method=Full http://www.securityfocus.com/bid/3666 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Macromedia JRun 3.0 and 3.1 allows remote attackers to obtain duplicate active user session IDs and perform actions as other users via a URL request for the web application directory without the trailing '/' (slash), as demonstrated using ctx. • http://www.iss.net/security_center/static/7680.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22260&Method=Full http://www.securityfocus.com/bid/3600 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request's body has an #include statement. • http://marc.info/?l=bugtraq&m=100697797325013&w=2 http://www.macromedia.com/v1/handlers/index.cfm?ID=22261&Method=Full http://www.securityfocus.com/bid/3589 https://exchange.xforce.ibmcloud.com/vulnerabilities/7622 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Cross-site scripting vulnerability in Allaire JRun 3.0 and 2.3.3 allows a malicious webmaster to embed Javascript in a request for a .JSP, .shtml, .jsp10, .jrun, or .thtml file that does not exist, which causes the Javascript to be inserted into an error message. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html http://www.kb.cert.org/vuls/id/654643 http://www.macromedia.com/v1/handlers/index.cfm?ID=21498&Method=Full http://www.osvdb.org/1891 http://www.securityfocus.com/bid/2983 https://exchange.xforce.ibmcloud.com/vulnerabilities/6793 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Allaire JRun 3.0 allows remote attackers to list contents of the WEB-INF directory, and the web.xml file in the WEB-INF directory, via a malformed URL that contains a "." • http://www.allaire.com/handlers/index.cfm?ID=19546&Method=Full https://exchange.xforce.ibmcloud.com/vulnerabilities/6008 •