Page 4 of 22 results (0.003 seconds)

CVSS: 5.0EPSS: 6%CPEs: 3EXPL: 0

Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF."). • http://online.securityfocus.com/archive/1/279582 http://www.iss.net/security_center/static/9446.php http://www.macromedia.com/v1/handlers/index.cfm?ID=23164 http://www.securityfocus.com/bid/5119 http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL. • http://www.iss.net/security_center/static/10570.php http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500 http://www.securityfocus.com/bid/6126 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unknown "file disclosure" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact. • http://www.iss.net/security_center/static/10571.php http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500 http://www.securityfocus.com/bid/6125 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name. Desbordamiento de búfer basado en el montón (heap) en el mecanismo de manejo de errores en el manejador de IIS ISAPI en Macromedia JRun 4.0 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante una peticón HTTP GET con un nombre de fichero .jsp largo. • http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html http://marc.info/?l=bugtraq&r=1&b=200211&w=2 http://www.eeye.com/html/Research/Advisories/AD20021112.html http://www.securityfocus.com/bid/6122 https://exchange.xforce.ibmcloud.com/vulnerabilities/10568 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html http://online.securityfocus.com/archive/1/280062 http://www.iss.net/security_center/static/9459.php http://www.macromedia.com/v1/handlers/index.cfm?ID=23164 http://www.osvdb.org/5028 http://www.securityfocus.com/bid/5134 •