Page 6 of 39 results (0.006 seconds)

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 2

Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) "%3f.jsp", (2) "?.jsp" or (3) "?" to the requested URL. • http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2 http://online.securityfocus.com/archive/1/243203 http://www.iss.net/security_center/static/7623.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22262&Method=Full http://www.securityfocus.com/archive/1/243636 http://www.securityfocus.com/bid/3592 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) "jsp%00" or (2) "js%2570". • http://www.iss.net/security_center/static/7676.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22288&Method=Full •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request. • http://www.iss.net/security_center/static/7678.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22290&Method=Full http://www.securityfocus.com/bid/3666 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing. • http://www.iss.net/security_center/static/7679.php http://www.macromedia.com/v1/handlers/index.cfm?ID=22291&Method=Full http://www.securityfocus.com/bid/3665 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request's body has an #include statement. • http://marc.info/?l=bugtraq&m=100697797325013&w=2 http://www.macromedia.com/v1/handlers/index.cfm?ID=22261&Method=Full http://www.securityfocus.com/bid/3589 https://exchange.xforce.ibmcloud.com/vulnerabilities/7622 •