All the vulnerabilites related to macromedia - jrun
cve-2002-2187
Vulnerability from cvelistv5
Published
2005-11-16 21:17
Modified
2024-09-16 19:24
Severity ?
EPSS score ?
Summary
Unknown "file disclosure" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/6125 | vdb-entry, x_refsource_BID | |
http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500 | x_refsource_CONFIRM | |
http://www.iss.net/security_center/static/10571.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:51:17.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6125", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6125" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "name": "jrun-log-file-disclosure(10571)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10571.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unknown \"file disclosure\" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-16T21:17:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6125", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6125" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "name": "jrun-log-file-disclosure(10571)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10571.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown \"file disclosure\" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6125", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6125" }, { "name": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "name": "jrun-log-file-disclosure(10571)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10571.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2187", "datePublished": "2005-11-16T21:17:00Z", "dateReserved": "2005-11-16T00:00:00Z", "dateUpdated": "2024-09-16T19:24:52.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2182
Vulnerability from cvelistv5
Published
2005-07-10 04:00
Modified
2024-09-16 17:44
Severity ?
EPSS score ?
Summary
Session fixation vulnerability in Macromedia JRun 4.0 allows remote attackers to hijack user sessions by pre-setting the user session ID information used by the session server.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/11414 | vdb-entry, x_refsource_BID | |
http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html | vendor-advisory, x_refsource_ALLAIRE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.935Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "11414", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11414" }, { "name": "MPSB04-08", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Session fixation vulnerability in Macromedia JRun 4.0 allows remote attackers to hijack user sessions by pre-setting the user session ID information used by the session server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-10T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "11414", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11414" }, { "name": "MPSB04-08", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2182", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Session fixation vulnerability in Macromedia JRun 4.0 allows remote attackers to hijack user sessions by pre-setting the user session ID information used by the session server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "11414", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11414" }, { "name": "MPSB04-08", "refsource": "ALLAIRE", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2182", "datePublished": "2005-07-10T04:00:00Z", "dateReserved": "2005-07-10T04:00:00Z", "dateUpdated": "2024-09-16T17:44:15.732Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1050
Vulnerability from cvelistv5
Published
2001-01-22 05:00
Modified
2024-08-08 05:45
Severity ?
EPSS score ?
Summary
Allaire JRun 3.0 http servlet server allows remote attackers to directly access the WEB-INF directory via a URL request that contains an extra "/" in the beginning of the request (aka the "extra leading slash").
References
▼ | URL | Tags |
---|---|---|
http://www.allaire.com/handlers/index.cfm?ID=17966&Method=Full | vendor-advisory, x_refsource_ALLAIRE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5407 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/500 | vdb-entry, x_refsource_OSVDB | |
http://marc.info/?l=bugtraq&m=97236316510117&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:45:36.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ASB00-027", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17966\u0026Method=Full" }, { "name": "allaire-jrun-webinf-access(5407)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5407" }, { "name": "500", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/500" }, { "name": "20001023 Allaire\u0027s JRUN Unauthenticated Access to WEB-INF directory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=97236316510117\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Allaire JRun 3.0 http servlet server allows remote attackers to directly access the WEB-INF directory via a URL request that contains an extra \"/\" in the beginning of the request (aka the \"extra leading slash\")." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ASB00-027", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17966\u0026Method=Full" }, { "name": "allaire-jrun-webinf-access(5407)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5407" }, { "name": "500", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/500" }, { "name": "20001023 Allaire\u0027s JRUN Unauthenticated Access to WEB-INF directory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=97236316510117\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allaire JRun 3.0 http servlet server allows remote attackers to directly access the WEB-INF directory via a URL request that contains an extra \"/\" in the beginning of the request (aka the \"extra leading slash\")." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ASB00-027", "refsource": "ALLAIRE", "url": "http://www.allaire.com/handlers/index.cfm?ID=17966\u0026Method=Full" }, { "name": "allaire-jrun-webinf-access(5407)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5407" }, { "name": "500", "refsource": "OSVDB", "url": "http://www.osvdb.org/500" }, { "name": "20001023 Allaire\u0027s JRUN Unauthenticated Access to WEB-INF directory", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=97236316510117\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1050", "datePublished": "2001-01-22T05:00:00", "dateReserved": "2000-11-29T00:00:00", "dateUpdated": "2024-08-08T05:45:36.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1855
Vulnerability from cvelistv5
Published
2005-06-28 04:00
Modified
2024-09-16 16:43
Severity ?
EPSS score ?
Summary
Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/5119 | vdb-entry, x_refsource_BID | |
http://www.iss.net/security_center/static/9446.php | vdb-entry, x_refsource_XF | |
http://www.macromedia.com/v1/handlers/index.cfm?ID=23164 | x_refsource_CONFIRM | |
http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt | x_refsource_MISC | |
http://online.securityfocus.com/archive/1/279582 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:43:32.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "5119", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5119" }, { "name": "webinf-dot-file-retrieval(9446)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9446.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt" }, { "name": "20020628 wp-02-0002: \u0027WEB-INF\u0027 Folder accessible in Multiple Web Application Servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/279582" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot (\"WEB-INF.\")." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-06-28T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "5119", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5119" }, { "name": "webinf-dot-file-retrieval(9446)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9446.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt" }, { "name": "20020628 wp-02-0002: \u0027WEB-INF\u0027 Folder accessible in Multiple Web Application Servers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/279582" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1855", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot (\"WEB-INF.\")." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "5119", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5119" }, { "name": "webinf-dot-file-retrieval(9446)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9446.php" }, { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "name": "http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt", "refsource": "MISC", "url": "http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt" }, { "name": "20020628 wp-02-0002: \u0027WEB-INF\u0027 Folder accessible in Multiple Web Application Servers", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/279582" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1855", "datePublished": "2005-06-28T04:00:00Z", "dateReserved": "2005-06-28T04:00:00Z", "dateUpdated": "2024-09-16T16:43:17.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-4472
Vulnerability from cvelistv5
Published
2005-12-22 00:00
Modified
2024-08-07 23:46
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the Macromedia JRun 4 web server (JWS) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long request that is not properly handled during conversion to wide characters.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2005/2949 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/16026 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/283 | third-party-advisory, x_refsource_SREASON | |
http://secunia.com/advisories/18077 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/15905 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015370 | vdb-entry, x_refsource_SECTRACK | |
http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html | x_refsource_CONFIRM | |
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=360 | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:46:05.114Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2005-2949", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2949" }, { "name": "16026", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16026" }, { "name": "283", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/283" }, { "name": "18077", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18077" }, { "name": "15905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15905" }, { "name": "1015370", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015370" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" }, { "name": "20051221 Macromedia JRun 4 Web Server URL Parsing Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=360" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Macromedia JRun 4 web server (JWS) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long request that is not properly handled during conversion to wide characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-08-22T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2005-2949", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2949" }, { "name": "16026", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16026" }, { "name": "283", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/283" }, { "name": "18077", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18077" }, { "name": "15905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15905" }, { "name": "1015370", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015370" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" }, { "name": "20051221 Macromedia JRun 4 Web Server URL Parsing Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=360" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the Macromedia JRun 4 web server (JWS) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long request that is not properly handled during conversion to wide characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2005-2949", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2949" }, { "name": "16026", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16026" }, { "name": "283", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/283" }, { "name": "18077", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18077" }, { "name": "15905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15905" }, { "name": "1015370", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015370" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" }, { "name": "20051221 Macromedia JRun 4 Web Server URL Parsing Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=360" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4472", "datePublished": "2005-12-22T00:00:00", "dateReserved": "2005-12-21T00:00:00", "dateUpdated": "2024-08-07T23:46:05.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0926
Vulnerability from cvelistv5
Published
2002-02-02 05:00
Modified
2024-08-08 04:37
Severity ?
EPSS score ?
Summary
SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request's body has an #include statement.
References
▼ | URL | Tags |
---|---|---|
http://www.macromedia.com/v1/handlers/index.cfm?ID=22261&Method=Full | x_refsource_CONFIRM | |
http://marc.info/?l=bugtraq&m=100697797325013&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/3589 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7622 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:37:06.837Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22261\u0026Method=Full" }, { "name": "20011128 JRun SSI Request Body Parsing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=100697797325013\u0026w=2" }, { "name": "3589", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3589" }, { "name": "allaire-jrun-view-source(7622)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7622" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-11-28T00:00:00", "descriptions": [ { "lang": "en", "value": "SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request\u0027s body has an #include statement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22261\u0026Method=Full" }, { "name": "20011128 JRun SSI Request Body Parsing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=100697797325013\u0026w=2" }, { "name": "3589", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3589" }, { "name": "allaire-jrun-view-source(7622)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7622" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request\u0027s body has an #include statement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22261\u0026Method=Full", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22261\u0026Method=Full" }, { "name": "20011128 JRun SSI Request Body Parsing", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=100697797325013\u0026w=2" }, { "name": "3589", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3589" }, { "name": "allaire-jrun-view-source(7622)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7622" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0926", "datePublished": "2002-02-02T05:00:00", "dateReserved": "2002-01-31T00:00:00", "dateUpdated": "2024-08-08T04:37:06.837Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0539
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-08 05:21
Severity ?
EPSS score ?
Summary
Servlet examples in Allaire JRun 2.3.x allow remote attackers to obtain sensitive information, e.g. listing HttpSession ID's via the SessionServlet servlet.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/4774 | vdb-entry, x_refsource_XF | |
http://www.allaire.com/handlers/index.cfm?ID=16290&Method=Full | vendor-advisory, x_refsource_ALLAIRE | |
http://www.osvdb.org/818 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/1386 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:21:30.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "jrun-read-sample-files(4774)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" }, { "name": "ASB00-015", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "name": "818", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/818" }, { "name": "1386", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-06-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Servlet examples in Allaire JRun 2.3.x allow remote attackers to obtain sensitive information, e.g. listing HttpSession ID\u0027s via the SessionServlet servlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "jrun-read-sample-files(4774)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" }, { "name": "ASB00-015", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "name": "818", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/818" }, { "name": "1386", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0539", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Servlet examples in Allaire JRun 2.3.x allow remote attackers to obtain sensitive information, e.g. listing HttpSession ID\u0027s via the SessionServlet servlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "jrun-read-sample-files(4774)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" }, { "name": "ASB00-015", "refsource": "ALLAIRE", "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "name": "818", "refsource": "OSVDB", "url": "http://www.osvdb.org/818" }, { "name": "1386", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0539", "datePublished": "2000-10-13T04:00:00", "dateReserved": "2000-07-11T00:00:00", "dateUpdated": "2024-08-08T05:21:30.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0665
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:56
Severity ?
EPSS score ?
Summary
Macromedia JRun Administration Server allows remote attackers to bypass authentication on the login form via an extra slash (/) in the URL.
References
▼ | URL | Tags |
---|---|---|
http://www.macromedia.com/v1/handlers/index.cfm?ID=23164 | x_refsource_CONFIRM | |
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0133.html | mailing-list, x_refsource_VULNWATCH | |
http://www.securityfocus.com/bid/5118 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=102529402127195&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.iss.net/security_center/static/9450.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:38.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "name": "20020628 [VulnWatch] wp-02-0009: Macromedia JRun Admin Server Authentication Bypass", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0133.html" }, { "name": "5118", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5118" }, { "name": "20020628 wp-02-0009: Macromedia JRun Admin Server Authentication Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=102529402127195\u0026w=2" }, { "name": "jrun-forwardslash-auth-bypass(9450)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9450.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Macromedia JRun Administration Server allows remote attackers to bypass authentication on the login form via an extra slash (/) in the URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "name": "20020628 [VulnWatch] wp-02-0009: Macromedia JRun Admin Server Authentication Bypass", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0133.html" }, { "name": "5118", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5118" }, { "name": "20020628 wp-02-0009: Macromedia JRun Admin Server Authentication Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=102529402127195\u0026w=2" }, { "name": "jrun-forwardslash-auth-bypass(9450)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9450.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0665", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Macromedia JRun Administration Server allows remote attackers to bypass authentication on the login form via an extra slash (/) in the URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "name": "20020628 [VulnWatch] wp-02-0009: Macromedia JRun Admin Server Authentication Bypass", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0133.html" }, { "name": "5118", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5118" }, { "name": "20020628 wp-02-0009: Macromedia JRun Admin Server Authentication Bypass", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=102529402127195\u0026w=2" }, { "name": "jrun-forwardslash-auth-bypass(9450)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9450.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0665", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-07-04T00:00:00", "dateUpdated": "2024-08-08T02:56:38.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1310
Vulnerability from cvelistv5
Published
2002-11-21 05:00
Modified
2024-08-08 03:19
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/6122 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&r=1&b=200211&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.eeye.com/html/Research/Advisories/AD20021112.html | third-party-advisory, x_refsource_EEYE | |
http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10568 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html | mailing-list, x_refsource_VULNWATCH |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6122", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6122" }, { "name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026r=1\u0026b=200211\u0026w=2" }, { "name": "AD20021112", "tags": [ "third-party-advisory", "x_refsource_EEYE", "x_transferred" ], "url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html" }, { "name": "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html" }, { "name": "jrun-long-url-bo(10568)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568" }, { "name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6122", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6122" }, { "name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026r=1\u0026b=200211\u0026w=2" }, { "name": "AD20021112", "tags": [ "third-party-advisory", "x_refsource_EEYE" ], "url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html" }, { "name": "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html" }, { "name": "jrun-long-url-bo(10568)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568" }, { "name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6122", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6122" }, { "name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026r=1\u0026b=200211\u0026w=2" }, { "name": "AD20021112", "refsource": "EEYE", "url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html" }, { "name": "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html" }, { "name": "jrun-long-url-bo(10568)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568" }, { "name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1310", "datePublished": "2002-11-21T05:00:00", "dateReserved": "2002-11-15T00:00:00", "dateUpdated": "2024-08-08T03:19:28.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0928
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in ";.cfm".
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=109621995623823&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/12647/ | third-party-advisory, x_refsource_SECUNIA | |
http://www.kb.cert.org/vuls/id/977440 | third-party-advisory, x_refsource_CERT-VN | |
http://www.idefense.com/application/poi/display?id=148&type=vulnerabilities | third-party-advisory, x_refsource_IDEFENSE | |
http://www.securityfocus.com/bid/11245 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17484 | vdb-entry, x_refsource_XF | |
http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/12638/ | third-party-advisory, x_refsource_SECUNIA | |
http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:48.097Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "12647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12647/" }, { "name": "VU#977440", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/977440" }, { "name": "20041005 ColdFusion MX 6.1 on IIS File Contents Disclosure", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=148\u0026type=vulnerabilities" }, { "name": "11245", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11245" }, { "name": "coldfusion-jrun-restriction-bypass(17484)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17484" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12638/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in \";.cfm\"." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "12647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12647/" }, { "name": "VU#977440", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/977440" }, { "name": "20041005 ColdFusion MX 6.1 on IIS File Contents Disclosure", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=148\u0026type=vulnerabilities" }, { "name": "11245", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11245" }, { "name": "coldfusion-jrun-restriction-bypass(17484)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17484" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12638/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0928", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in \";.cfm\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "12647", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12647/" }, { "name": "VU#977440", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/977440" }, { "name": "20041005 ColdFusion MX 6.1 on IIS File Contents Disclosure", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=148\u0026type=vulnerabilities" }, { "name": "11245", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11245" }, { "name": "coldfusion-jrun-restriction-bypass(17484)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17484" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12638/" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0928", "datePublished": "2005-04-21T04:00:00", "dateReserved": "2004-10-04T00:00:00", "dateUpdated": "2024-08-08T00:31:48.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-4473
Vulnerability from cvelistv5
Published
2005-12-22 00:00
Modified
2024-08-07 23:46
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Macromedia JRun 4 web server (JWS) allows remote attackers to view web application source code via "a malformed URL."
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2005/2949 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/18077 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/15905 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1015370 | vdb-entry, x_refsource_SECTRACK | |
http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:46:05.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2005-2949", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2949" }, { "name": "18077", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18077" }, { "name": "15905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15905" }, { "name": "1015370", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015370" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Macromedia JRun 4 web server (JWS) allows remote attackers to view web application source code via \"a malformed URL.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2005-2949", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2949" }, { "name": "18077", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18077" }, { "name": "15905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15905" }, { "name": "1015370", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015370" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Macromedia JRun 4 web server (JWS) allows remote attackers to view web application source code via \"a malformed URL.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2005-2949", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2949" }, { "name": "18077", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18077" }, { "name": "15905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15905" }, { "name": "1015370", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015370" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4473", "datePublished": "2005-12-22T00:00:00", "dateReserved": "2005-12-21T00:00:00", "dateUpdated": "2024-08-07T23:46:05.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1815
Vulnerability from cvelistv5
Published
2005-05-10 04:00
Modified
2024-08-08 01:07
Severity ?
EPSS score ?
Summary
Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=107936690702515&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/11132 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15473 | vdb-entry, x_refsource_XF | |
http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/9877 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:07:48.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040315 Multiple Vendor SOAP server array DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "name": "11132", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11132" }, { "name": "soap-array-dos(15473)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html" }, { "name": "9877", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9877" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040315 Multiple Vendor SOAP server array DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "name": "11132", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11132" }, { "name": "soap-array-dos(15473)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html" }, { "name": "9877", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9877" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1815", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040315 Multiple Vendor SOAP server array DoS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "name": "11132", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11132" }, { "name": "soap-array-dos(15473)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html" }, { "name": "9877", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9877" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1815", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T01:07:48.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0540
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-08 05:21
Severity ?
EPSS score ?
Summary
JSP sample files in Allaire JRun 2.3.x allow remote attackers to access arbitrary files (e.g. via viewsource.jsp) or obtain configuration information.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/2713 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/4774 | vdb-entry, x_refsource_XF | |
http://www.allaire.com/handlers/index.cfm?ID=16290&Method=Full | vendor-advisory, x_refsource_ALLAIRE | |
http://www.securityfocus.com/bid/1386 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:21:31.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2713", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/2713" }, { "name": "jrun-read-sample-files(4774)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" }, { "name": "ASB00-015", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "name": "1386", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-06-22T00:00:00", "descriptions": [ { "lang": "en", "value": "JSP sample files in Allaire JRun 2.3.x allow remote attackers to access arbitrary files (e.g. via viewsource.jsp) or obtain configuration information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2713", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/2713" }, { "name": "jrun-read-sample-files(4774)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" }, { "name": "ASB00-015", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "name": "1386", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0540", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JSP sample files in Allaire JRun 2.3.x allow remote attackers to access arbitrary files (e.g. via viewsource.jsp) or obtain configuration information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2713", "refsource": "OSVDB", "url": "http://www.osvdb.org/2713" }, { "name": "jrun-read-sample-files(4774)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" }, { "name": "ASB00-015", "refsource": "ALLAIRE", "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "name": "1386", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0540", "datePublished": "2000-10-13T04:00:00", "dateReserved": "2000-07-11T00:00:00", "dateUpdated": "2024-08-08T05:21:31.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2186
Vulnerability from cvelistv5
Published
2005-11-16 21:17
Modified
2024-09-17 03:28
Severity ?
EPSS score ?
Summary
Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL.
References
▼ | URL | Tags |
---|---|---|
http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500 | x_refsource_CONFIRM | |
http://www.iss.net/security_center/static/10570.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/6126 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:51:17.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "name": "jrun-unicode-source-disclosure(10570)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10570.php" }, { "name": "6126", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6126" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-16T21:17:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "name": "jrun-unicode-source-disclosure(10570)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10570.php" }, { "name": "6126", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6126" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "name": "jrun-unicode-source-disclosure(10570)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10570.php" }, { "name": "6126", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6126" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2186", "datePublished": "2005-11-16T21:17:00Z", "dateReserved": "2005-11-16T00:00:00Z", "dateUpdated": "2024-09-17T03:28:59.770Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1545
Vulnerability from cvelistv5
Published
2005-07-14 04:00
Modified
2024-09-16 16:59
Severity ?
EPSS score ?
Summary
Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing.
References
▼ | URL | Tags |
---|---|---|
http://www.macromedia.com/v1/handlers/index.cfm?ID=22291&Method=Full | x_refsource_CONFIRM | |
http://www.iss.net/security_center/static/7679.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/3665 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:58:11.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22291\u0026Method=Full" }, { "name": "allaire-jrun-jsessionid-appended(7679)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7679.php" }, { "name": "3665", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3665" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-14T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22291\u0026Method=Full" }, { "name": "allaire-jrun-jsessionid-appended(7679)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7679.php" }, { "name": "3665", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3665" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1545", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22291\u0026Method=Full", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22291\u0026Method=Full" }, { "name": "allaire-jrun-jsessionid-appended(7679)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7679.php" }, { "name": "3665", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3665" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1545", "datePublished": "2005-07-14T04:00:00Z", "dateReserved": "2005-07-14T00:00:00Z", "dateUpdated": "2024-09-16T16:59:01.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1049
Vulnerability from cvelistv5
Published
2001-01-22 05:00
Modified
2024-08-08 05:45
Severity ?
EPSS score ?
Summary
Allaire JRun 3.0 http servlet server allows remote attackers to cause a denial of service via a URL that contains a long string of "." characters.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/5452 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=97310314724964&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.allaire.com/handlers/index.cfm?ID=18085&Method=Full | vendor-advisory, x_refsource_ALLAIRE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:45:36.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "allaire-jrun-servlet-dos(5452)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5452" }, { "name": "20001101 Allaire\u0027s JRUN DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=97310314724964\u0026w=2" }, { "name": "ASB00-030", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=18085\u0026Method=Full" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Allaire JRun 3.0 http servlet server allows remote attackers to cause a denial of service via a URL that contains a long string of \".\" characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "allaire-jrun-servlet-dos(5452)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5452" }, { "name": "20001101 Allaire\u0027s JRUN DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=97310314724964\u0026w=2" }, { "name": "ASB00-030", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=18085\u0026Method=Full" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allaire JRun 3.0 http servlet server allows remote attackers to cause a denial of service via a URL that contains a long string of \".\" characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "allaire-jrun-servlet-dos(5452)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5452" }, { "name": "20001101 Allaire\u0027s JRUN DoS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=97310314724964\u0026w=2" }, { "name": "ASB00-030", "refsource": "ALLAIRE", "url": "http://www.allaire.com/handlers/index.cfm?ID=18085\u0026Method=Full" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1049", "datePublished": "2001-01-22T05:00:00", "dateReserved": "2000-11-29T00:00:00", "dateUpdated": "2024-08-08T05:45:36.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1512
Vulnerability from cvelistv5
Published
2005-07-14 04:00
Modified
2024-08-08 04:58
Severity ?
EPSS score ?
Summary
Unknown vulnerability in Allaire JRun 3.1 allows remote attackers to directly access the WEB-INF and META-INF directories and execute arbitrary JavaServer Pages (JSP), a variant of CVE-2000-1050.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/7677.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/3662 | vdb-entry, x_refsource_BID | |
http://www.macromedia.com/v1/handlers/index.cfm?ID=22287 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:58:11.698Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "allaire-jrun-webinf-metainf-jsp(7677)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7677.php" }, { "name": "3662", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3662" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22287" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Allaire JRun 3.1 allows remote attackers to directly access the WEB-INF and META-INF directories and execute arbitrary JavaServer Pages (JSP), a variant of CVE-2000-1050." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-04T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "allaire-jrun-webinf-metainf-jsp(7677)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7677.php" }, { "name": "3662", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3662" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22287" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Allaire JRun 3.1 allows remote attackers to directly access the WEB-INF and META-INF directories and execute arbitrary JavaServer Pages (JSP), a variant of CVE-2000-1050." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "allaire-jrun-webinf-metainf-jsp(7677)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7677.php" }, { "name": "3662", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3662" }, { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22287", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22287" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1512", "datePublished": "2005-07-14T04:00:00", "dateReserved": "2005-07-14T00:00:00", "dateUpdated": "2024-08-08T04:58:11.698Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1513
Vulnerability from cvelistv5
Published
2005-07-14 04:00
Modified
2024-08-08 04:58
Severity ?
EPSS score ?
Summary
Macromedia JRun 3.0 and 3.1 allows remote attackers to obtain duplicate active user session IDs and perform actions as other users via a URL request for the web application directory without the trailing '/' (slash), as demonstrated using ctx.
References
▼ | URL | Tags |
---|---|---|
http://www.macromedia.com/v1/handlers/index.cfm?ID=22260&Method=Full | x_refsource_CONFIRM | |
http://www.iss.net/security_center/static/7680.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/3600 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:58:11.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22260\u0026Method=Full" }, { "name": "allaire-jrun-sessionid-duplicated(7680)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7680.php" }, { "name": "3600", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3600" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-11-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Macromedia JRun 3.0 and 3.1 allows remote attackers to obtain duplicate active user session IDs and perform actions as other users via a URL request for the web application directory without the trailing \u0027/\u0027 (slash), as demonstrated using ctx." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-04T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22260\u0026Method=Full" }, { "name": "allaire-jrun-sessionid-duplicated(7680)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7680.php" }, { "name": "3600", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3600" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1513", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Macromedia JRun 3.0 and 3.1 allows remote attackers to obtain duplicate active user session IDs and perform actions as other users via a URL request for the web application directory without the trailing \u0027/\u0027 (slash), as demonstrated using ctx." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22260\u0026Method=Full", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22260\u0026Method=Full" }, { "name": "allaire-jrun-sessionid-duplicated(7680)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7680.php" }, { "name": "3600", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3600" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1513", "datePublished": "2005-07-14T04:00:00", "dateReserved": "2005-07-14T00:00:00", "dateUpdated": "2024-08-08T04:58:11.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0646
Vulnerability from cvelistv5
Published
2004-11-19 05:00
Modified
2024-08-08 00:24
Severity ?
EPSS score ?
Summary
Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/377194 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/12647/ | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/11245 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/990200 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17485 | vdb-entry, x_refsource_XF | |
http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html | x_refsource_CONFIRM | |
http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:27.006Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040929 iDEFENSE Security Advisory 09.29.04 - Macromedia JRun 4 mod_jrun Apache Module Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/377194" }, { "name": "12647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12647/" }, { "name": "11245", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11245" }, { "name": "VU#990200", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/990200" }, { "name": "coldfusion-jrun-verbose-bo(17485)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17485" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040929 iDEFENSE Security Advisory 09.29.04 - Macromedia JRun 4 mod_jrun Apache Module Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/377194" }, { "name": "12647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12647/" }, { "name": "11245", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11245" }, { "name": "VU#990200", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/990200" }, { "name": "coldfusion-jrun-verbose-bo(17485)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17485" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040929 iDEFENSE Security Advisory 09.29.04 - Macromedia JRun 4 mod_jrun Apache Module Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/377194" }, { "name": "12647", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12647/" }, { "name": "11245", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11245" }, { "name": "VU#990200", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/990200" }, { "name": "coldfusion-jrun-verbose-bo(17485)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17485" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0646", "datePublished": "2004-11-19T05:00:00", "dateReserved": "2004-07-08T00:00:00", "dateUpdated": "2024-08-08T00:24:27.006Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1544
Vulnerability from cvelistv5
Published
2005-07-14 04:00
Modified
2024-09-17 00:46
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request.
References
▼ | URL | Tags |
---|---|---|
http://www.macromedia.com/v1/handlers/index.cfm?ID=22290&Method=Full | x_refsource_CONFIRM | |
http://www.iss.net/security_center/static/7678.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/3666 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:58:11.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22290\u0026Method=Full" }, { "name": "allaire-jrun-jws-directory-traversal(7678)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7678.php" }, { "name": "3666", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3666" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-14T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22290\u0026Method=Full" }, { "name": "allaire-jrun-jws-directory-traversal(7678)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7678.php" }, { "name": "3666", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3666" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1544", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22290\u0026Method=Full", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22290\u0026Method=Full" }, { "name": "allaire-jrun-jws-directory-traversal(7678)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7678.php" }, { "name": "3666", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3666" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1544", "datePublished": "2005-07-14T04:00:00Z", "dateReserved": "2005-07-14T00:00:00Z", "dateUpdated": "2024-09-17T00:46:30.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2306
Vulnerability from cvelistv5
Published
2005-07-19 04:00
Modified
2024-08-07 22:22
Severity ?
EPSS score ?
Summary
Race condition in Macromedia JRun 4.0, ColdFusion MX 6.1 and 7.0, when under heavy load, causes JRun to assign a duplicate authentication token to multiple sessions, which could allow authenticated users to gain privileges as other users.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/16081 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1014489 | vdb-entry, x_refsource_SECTRACK | |
http://www.macromedia.com/devnet/security/security_zone/mpsb05-05.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:22:48.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "16081", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16081" }, { "name": "1014489", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014489" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-05.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in Macromedia JRun 4.0, ColdFusion MX 6.1 and 7.0, when under heavy load, causes JRun to assign a duplicate authentication token to multiple sessions, which could allow authenticated users to gain privileges as other users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-01-17T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "16081", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16081" }, { "name": "1014489", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014489" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-05.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in Macromedia JRun 4.0, ColdFusion MX 6.1 and 7.0, when under heavy load, causes JRun to assign a duplicate authentication token to multiple sessions, which could allow authenticated users to gain privileges as other users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "16081", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16081" }, { "name": "1014489", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014489" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-05.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-05.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2306", "datePublished": "2005-07-19T04:00:00", "dateReserved": "2005-07-19T00:00:00", "dateUpdated": "2024-08-07T22:22:48.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1816
Vulnerability from cvelistv5
Published
2005-05-10 04:00
Modified
2024-08-08 01:07
Severity ?
EPSS score ?
Summary
Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=107936690702515&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/11130 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15473 | vdb-entry, x_refsource_XF | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1 | vendor-advisory, x_refsource_SUNALERT | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1 | vendor-advisory, x_refsource_SUNALERT | |
http://www.securityfocus.com/bid/9877 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:07:48.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040315 Multiple Vendor SOAP server array DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "name": "11130", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11130" }, { "name": "soap-array-dos(15473)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "name": "57517", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1" }, { "name": "201713", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1" }, { "name": "9877", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9877" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040315 Multiple Vendor SOAP server array DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "name": "11130", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11130" }, { "name": "soap-array-dos(15473)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "name": "57517", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1" }, { "name": "201713", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1" }, { "name": "9877", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9877" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040315 Multiple Vendor SOAP server array DoS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "name": "11130", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11130" }, { "name": "soap-array-dos(15473)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "name": "57517", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1" }, { "name": "201713", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1" }, { "name": "9877", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9877" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1816", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T01:07:48.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1051
Vulnerability from cvelistv5
Published
2001-01-22 05:00
Modified
2024-08-08 05:45
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in Allaire JRun 2.3 server allows remote attackers to read arbitrary files via the SSIFilter servlet.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=97236692714978&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5405 | vdb-entry, x_refsource_XF | |
http://www.allaire.com/handlers/index.cfm?ID=17968&Method=Full | vendor-advisory, x_refsource_ALLAIRE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:45:36.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001023 Allaire JRUN 2.3 Arbitrary File Retrieval", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" }, { "name": "allaire-jrun-ssifilter-url(5405)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5405" }, { "name": "ASB00-028", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17968\u0026Method=Full" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Allaire JRun 2.3 server allows remote attackers to read arbitrary files via the SSIFilter servlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001023 Allaire JRUN 2.3 Arbitrary File Retrieval", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" }, { "name": "allaire-jrun-ssifilter-url(5405)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5405" }, { "name": "ASB00-028", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17968\u0026Method=Full" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Allaire JRun 2.3 server allows remote attackers to read arbitrary files via the SSIFilter servlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001023 Allaire JRUN 2.3 Arbitrary File Retrieval", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" }, { "name": "allaire-jrun-ssifilter-url(5405)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5405" }, { "name": "ASB00-028", "refsource": "ALLAIRE", "url": "http://www.allaire.com/handlers/index.cfm?ID=17968\u0026Method=Full" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1051", "datePublished": "2001-01-22T05:00:00", "dateReserved": "2000-11-29T00:00:00", "dateUpdated": "2024-08-08T05:45:36.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1477
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:53
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Management Console in JRun 4.0 allows remote attackers to execute arbitrary web script or HTML and possibly hijack a user's session.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/668206 | third-party-advisory, x_refsource_CERT-VN | |
http://marc.info/?l=bugtraq&m=109621995623823&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17483 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/11245 | vdb-entry, x_refsource_BID | |
http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/12638/ | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:24.031Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#668206", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/668206" }, { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "jrun-management-console-xss(17483)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17483" }, { "name": "11245", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11245" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12638/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Management Console in JRun 4.0 allows remote attackers to execute arbitrary web script or HTML and possibly hijack a user\u0027s session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#668206", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/668206" }, { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "jrun-management-console-xss(17483)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17483" }, { "name": "11245", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11245" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12638/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1477", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Management Console in JRun 4.0 allows remote attackers to execute arbitrary web script or HTML and possibly hijack a user\u0027s session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#668206", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/668206" }, { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "jrun-management-console-xss(17483)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17483" }, { "name": "11245", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11245" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12638/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1477", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2005-02-13T00:00:00", "dateUpdated": "2024-08-08T00:53:24.031Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1053
Vulnerability from cvelistv5
Published
2000-11-29 05:00
Modified
2024-08-08 05:45
Severity ?
EPSS score ?
Summary
Allaire JRun 2.3.3 server allows remote attackers to compile and execute JSP code by inserting it via a cross-site scripting (CSS) attack and directly calling the com.livesoftware.jrun.plugins.JSP JSP servlet.
References
▼ | URL | Tags |
---|---|---|
http://www.allaire.com/handlers/index.cfm?ID=17969&Method=Full | vendor-advisory, x_refsource_ALLAIRE | |
http://marc.info/?l=bugtraq&m=97236125107957&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5406 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:45:36.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ASB00-029", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17969\u0026Method=Full" }, { "name": "20001023 Allaire JRUN 2.3 Remote command execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=97236125107957\u0026w=2" }, { "name": "allaire-jrun-jsp-execute(5406)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5406" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Allaire JRun 2.3.3 server allows remote attackers to compile and execute JSP code by inserting it via a cross-site scripting (CSS) attack and directly calling the com.livesoftware.jrun.plugins.JSP JSP servlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ASB00-029", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17969\u0026Method=Full" }, { "name": "20001023 Allaire JRUN 2.3 Remote command execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=97236125107957\u0026w=2" }, { "name": "allaire-jrun-jsp-execute(5406)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5406" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allaire JRun 2.3.3 server allows remote attackers to compile and execute JSP code by inserting it via a cross-site scripting (CSS) attack and directly calling the com.livesoftware.jrun.plugins.JSP JSP servlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ASB00-029", "refsource": "ALLAIRE", "url": "http://www.allaire.com/handlers/index.cfm?ID=17969\u0026Method=Full" }, { "name": "20001023 Allaire JRUN 2.3 Remote command execution", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=97236125107957\u0026w=2" }, { "name": "allaire-jrun-jsp-execute(5406)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5406" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1053", "datePublished": "2000-11-29T05:00:00", "dateReserved": "2000-11-29T00:00:00", "dateUpdated": "2024-08-08T05:45:36.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1511
Vulnerability from cvelistv5
Published
2005-07-14 04:00
Modified
2024-09-17 02:48
Severity ?
EPSS score ?
Summary
JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) "jsp%00" or (2) "js%2570".
References
▼ | URL | Tags |
---|---|---|
http://www.macromedia.com/v1/handlers/index.cfm?ID=22288&Method=Full | x_refsource_CONFIRM | |
http://www.iss.net/security_center/static/7676.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:58:11.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22288\u0026Method=Full" }, { "name": "allaire-jrun-view-jsp-source(7676)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7676.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) \"jsp%00\" or (2) \"js%2570\"." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-14T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22288\u0026Method=Full" }, { "name": "allaire-jrun-view-jsp-source(7676)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7676.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1511", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) \"jsp%00\" or (2) \"js%2570\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22288\u0026Method=Full", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22288\u0026Method=Full" }, { "name": "allaire-jrun-view-jsp-source(7676)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7676.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1511", "datePublished": "2005-07-14T04:00:00Z", "dateReserved": "2005-07-14T00:00:00Z", "dateUpdated": "2024-09-17T02:48:04.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0801
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:03
Severity ?
EPSS score ?
Summary
Buffer overflow in the ISAPI DLL filter for Macromedia JRun 3.1 allows remote attackers to execute arbitrary code via a direct request to the filter with a long HTTP host header field in a URL for a .jsp file.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/4873 | vdb-entry, x_refsource_BID | |
http://online.securityfocus.com/archive/1/274528 | mailing-list, x_refsource_BUGTRAQ | |
http://online.securityfocus.com/archive/1/274601 | mailing-list, x_refsource_BUGTRAQ | |
http://www.osvdb.org/5082 | vdb-entry, x_refsource_OSVDB | |
http://www.cert.org/advisories/CA-2002-14.html | third-party-advisory, x_refsource_CERT | |
http://www.iss.net/security_center/static/9194.php | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0085.html | mailing-list, x_refsource_VULNWATCH | |
http://www.kb.cert.org/vuls/id/703835 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:03:48.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4873", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4873" }, { "name": "20020529 Macromedia JRUN Buffer overflow vulnerability (#NISR29052002)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/274528" }, { "name": "20020529 Addendum to advisory #NISR29052002 (JRun buffer overflow)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/274601" }, { "name": "5082", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5082" }, { "name": "CA-2002-14", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2002-14.html" }, { "name": "jrun-isapi-host-bo(9194)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9194.php" }, { "name": "20020529 [VulnWatch] FW: Macromedia JRUN Buffer overflow vulnerability (#NISR29052002)", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0085.html" }, { "name": "VU#703835", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/703835" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the ISAPI DLL filter for Macromedia JRun 3.1 allows remote attackers to execute arbitrary code via a direct request to the filter with a long HTTP host header field in a URL for a .jsp file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-07-31T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4873", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4873" }, { "name": "20020529 Macromedia JRUN Buffer overflow vulnerability (#NISR29052002)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/274528" }, { "name": "20020529 Addendum to advisory #NISR29052002 (JRun buffer overflow)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/274601" }, { "name": "5082", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5082" }, { "name": "CA-2002-14", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2002-14.html" }, { "name": "jrun-isapi-host-bo(9194)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9194.php" }, { "name": "20020529 [VulnWatch] FW: Macromedia JRUN Buffer overflow vulnerability (#NISR29052002)", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0085.html" }, { "name": "VU#703835", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/703835" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0801", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the ISAPI DLL filter for Macromedia JRun 3.1 allows remote attackers to execute arbitrary code via a direct request to the filter with a long HTTP host header field in a URL for a .jsp file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4873", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4873" }, { "name": "20020529 Macromedia JRUN Buffer overflow vulnerability (#NISR29052002)", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/274528" }, { "name": "20020529 Addendum to advisory #NISR29052002 (JRun buffer overflow)", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/274601" }, { "name": "5082", "refsource": "OSVDB", "url": "http://www.osvdb.org/5082" }, { "name": "CA-2002-14", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2002-14.html" }, { "name": "jrun-isapi-host-bo(9194)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9194.php" }, { "name": "20020529 [VulnWatch] FW: Macromedia JRUN Buffer overflow vulnerability (#NISR29052002)", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0085.html" }, { "name": "VU#703835", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/703835" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0801", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-07-25T00:00:00", "dateUpdated": "2024-08-08T03:03:48.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0179
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 04:14
Severity ?
EPSS score ?
Summary
Allaire JRun 3.0 allows remote attackers to list contents of the WEB-INF directory, and the web.xml file in the WEB-INF directory, via a malformed URL that contains a "."
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/6008 | vdb-entry, x_refsource_XF | |
http://www.allaire.com/handlers/index.cfm?ID=19546&Method=Full | vendor-advisory, x_refsource_ALLAIRE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:14:06.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "jrun-webinf-file-retrieval(6008)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008" }, { "name": "ASB01-02", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=19546\u0026Method=Full" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Allaire JRun 3.0 allows remote attackers to list contents of the WEB-INF directory, and the web.xml file in the WEB-INF directory, via a malformed URL that contains a \".\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "jrun-webinf-file-retrieval(6008)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008" }, { "name": "ASB01-02", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=19546\u0026Method=Full" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0179", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allaire JRun 3.0 allows remote attackers to list contents of the WEB-INF directory, and the web.xml file in the WEB-INF directory, via a malformed URL that contains a \".\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "jrun-webinf-file-retrieval(6008)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008" }, { "name": "ASB01-02", "refsource": "ALLAIRE", "url": "http://www.allaire.com/handlers/index.cfm?ID=19546\u0026Method=Full" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0179", "datePublished": "2001-05-07T04:00:00", "dateReserved": "2001-03-08T00:00:00", "dateUpdated": "2024-08-08T04:14:06.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1025
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:12
Severity ?
EPSS score ?
Summary
JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed.
References
▼ | URL | Tags |
---|---|---|
http://www.macromedia.com/v1/handlers/index.cfm?ID=23164 | x_refsource_CONFIRM | |
http://www.osvdb.org/5028 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/5134 | vdb-entry, x_refsource_BID | |
http://online.securityfocus.com/archive/1/280062 | mailing-list, x_refsource_BUGTRAQ | |
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html | mailing-list, x_refsource_VULNWATCH | |
http://www.iss.net/security_center/static/9459.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:16.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "name": "5028", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5028" }, { "name": "5134", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5134" }, { "name": "20020701 KPMG-2002026: Jrun sourcecode Disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/280062" }, { "name": "20020701 [VulnWatch] KPMG-2002026: Jrun sourcecode Disclosure", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html" }, { "name": "jrun-null-view-source(9459)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9459.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-07-01T00:00:00", "descriptions": [ { "lang": "en", "value": "JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-09-10T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "name": "5028", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5028" }, { "name": "5134", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5134" }, { "name": "20020701 KPMG-2002026: Jrun sourcecode Disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/280062" }, { "name": "20020701 [VulnWatch] KPMG-2002026: Jrun sourcecode Disclosure", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html" }, { "name": "jrun-null-view-source(9459)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9459.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164", "refsource": "CONFIRM", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "name": "5028", "refsource": "OSVDB", "url": "http://www.osvdb.org/5028" }, { "name": "5134", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5134" }, { "name": "20020701 KPMG-2002026: Jrun sourcecode Disclosure", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/280062" }, { "name": "20020701 [VulnWatch] KPMG-2002026: Jrun sourcecode Disclosure", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html" }, { "name": "jrun-null-view-source(9459)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9459.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1025", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-08-27T00:00:00", "dateUpdated": "2024-08-08T03:12:16.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1478
Vulnerability from cvelistv5
Published
2005-02-13 05:00
Modified
2024-08-08 00:53
Severity ?
EPSS score ?
Summary
JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user's HTTP session.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/17481 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=109621995623823&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/11245 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/584958 | third-party-advisory, x_refsource_CERT-VN | |
http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/12638/ | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:23.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "jrun-jsessionid-hijack(17481)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17481" }, { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "11245", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11245" }, { "name": "VU#584958", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/584958" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12638/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-23T00:00:00", "descriptions": [ { "lang": "en", "value": "JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "jrun-jsessionid-hijack(17481)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17481" }, { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "11245", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11245" }, { "name": "VU#584958", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/584958" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12638/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1478", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "jrun-jsessionid-hijack(17481)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17481" }, { "name": "20040923 New Macromedia Security Zone Bulletins Posted", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "name": "11245", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11245" }, { "name": "VU#584958", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/584958" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "name": "12638", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12638/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1478", "datePublished": "2005-02-13T05:00:00", "dateReserved": "2005-02-13T00:00:00", "dateUpdated": "2024-08-08T00:53:23.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1510
Vulnerability from cvelistv5
Published
2005-07-14 04:00
Modified
2024-09-16 17:48
Severity ?
EPSS score ?
Summary
Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) "%3f.jsp", (2) "?.jsp" or (3) "?" to the requested URL.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/7623.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/3592 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/243636 | mailing-list, x_refsource_BUGTRAQ | |
http://online.securityfocus.com/archive/1/243203 | mailing-list, x_refsource_BUGTRAQ | |
http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.macromedia.com/v1/handlers/index.cfm?ID=22262&Method=Full | vendor-advisory, x_refsource_ALLAIRE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:58:11.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "allaire-jrun-view-directory(7623)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7623.php" }, { "name": "3592", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3592" }, { "name": "20011203 Allaire JRun ACL bypassing/soure disclosure vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/243636" }, { "name": "20011129 RE: def-2001-32 - Allaire JRun directory browsing vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/243203" }, { "name": "20011128 def-2001-32", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2" }, { "name": "MPSB01-13", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22262\u0026Method=Full" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) \"%3f.jsp\", (2) \"?.jsp\" or (3) \"?\" to the requested URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-14T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "allaire-jrun-view-directory(7623)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7623.php" }, { "name": "3592", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3592" }, { "name": "20011203 Allaire JRun ACL bypassing/soure disclosure vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/243636" }, { "name": "20011129 RE: def-2001-32 - Allaire JRun directory browsing vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/243203" }, { "name": "20011128 def-2001-32", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2" }, { "name": "MPSB01-13", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22262\u0026Method=Full" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1510", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) \"%3f.jsp\", (2) \"?.jsp\" or (3) \"?\" to the requested URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "allaire-jrun-view-directory(7623)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7623.php" }, { "name": "3592", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3592" }, { "name": "20011203 Allaire JRun ACL bypassing/soure disclosure vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/243636" }, { "name": "20011129 RE: def-2001-32 - Allaire JRun directory browsing vulnerability", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/243203" }, { "name": "20011128 def-2001-32", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2" }, { "name": "MPSB01-13", "refsource": "ALLAIRE", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22262\u0026Method=Full" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1510", "datePublished": "2005-07-14T04:00:00Z", "dateReserved": "2005-07-14T00:00:00Z", "dateUpdated": "2024-09-16T17:48:06.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0937
Vulnerability from cvelistv5
Published
2002-08-31 04:00
Modified
2024-08-08 03:03
Severity ?
EPSS score ?
Summary
The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null).
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/9339.php | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html | mailing-list, x_refsource_VULNWATCH | |
http://www.securityfocus.com/bid/4997 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:03:49.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "jsp-engine-wprinterjob-dos(9339)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9339.php" }, { "name": "20020611 [VulnWatch] Generic Crash-JSP", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html" }, { "name": "4997", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4997" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-09-10T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "jsp-engine-wprinterjob-dos(9339)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9339.php" }, { "name": "20020611 [VulnWatch] Generic Crash-JSP", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html" }, { "name": "4997", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4997" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "jsp-engine-wprinterjob-dos(9339)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9339.php" }, { "name": "20020611 [VulnWatch] Generic Crash-JSP", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html" }, { "name": "4997", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4997" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0937", "datePublished": "2002-08-31T04:00:00", "dateReserved": "2002-08-16T00:00:00", "dateUpdated": "2024-08-08T03:03:49.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1052
Vulnerability from cvelistv5
Published
2000-11-29 05:00
Modified
2024-08-08 05:45
Severity ?
EPSS score ?
Summary
Allaire JRun 2.3 server allows remote attackers to obtain source code for executable content by directly calling the SSIFilter servlet.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=97236692714978&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:45:36.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001023 Allaire JRUN 2.3 Arbitrary File Retrieval", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Allaire JRun 2.3 server allows remote attackers to obtain source code for executable content by directly calling the SSIFilter servlet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001023 Allaire JRUN 2.3 Arbitrary File Retrieval", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Allaire JRun 2.3 server allows remote attackers to obtain source code for executable content by directly calling the SSIFilter servlet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001023 Allaire JRUN 2.3 Arbitrary File Retrieval", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1052", "datePublished": "2000-11-29T05:00:00", "dateReserved": "2000-11-29T00:00:00", "dateUpdated": "2024-08-08T05:45:36.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1084
Vulnerability from cvelistv5
Published
2002-06-25 04:00
Modified
2024-08-08 04:44
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in Allaire JRun 3.0 and 2.3.3 allows a malicious webmaster to embed Javascript in a request for a .JSP, .shtml, .jsp10, .jrun, or .thtml file that does not exist, which causes the Javascript to be inserted into an error message.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/6793 | vdb-entry, x_refsource_XF | |
http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.macromedia.com/v1/handlers/index.cfm?ID=21498&Method=Full | vendor-advisory, x_refsource_ALLAIRE | |
http://www.osvdb.org/1891 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/2983 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/654643 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:44:07.480Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "java-servlet-crosssite-scripting(6793)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6793" }, { "name": "20010702 Multiple Vendor Java Servlet Container Cross-Site Scripting Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html" }, { "name": "MPSB01-06", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE", "x_transferred" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=21498\u0026Method=Full" }, { "name": "1891", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/1891" }, { "name": "2983", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2983" }, { "name": "VU#654643", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/654643" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Allaire JRun 3.0 and 2.3.3 allows a malicious webmaster to embed Javascript in a request for a .JSP, .shtml, .jsp10, .jrun, or .thtml file that does not exist, which causes the Javascript to be inserted into an error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-22T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "java-servlet-crosssite-scripting(6793)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6793" }, { "name": "20010702 Multiple Vendor Java Servlet Container Cross-Site Scripting Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html" }, { "name": "MPSB01-06", "tags": [ "vendor-advisory", "x_refsource_ALLAIRE" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=21498\u0026Method=Full" }, { "name": "1891", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/1891" }, { "name": "2983", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2983" }, { "name": "VU#654643", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/654643" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1084", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in Allaire JRun 3.0 and 2.3.3 allows a malicious webmaster to embed Javascript in a request for a .JSP, .shtml, .jsp10, .jrun, or .thtml file that does not exist, which causes the Javascript to be inserted into an error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "java-servlet-crosssite-scripting(6793)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6793" }, { "name": "20010702 Multiple Vendor Java Servlet Container Cross-Site Scripting Vulnerability", "refsource": "BUGTRAQ", "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html" }, { "name": "MPSB01-06", "refsource": "ALLAIRE", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=21498\u0026Method=Full" }, { "name": "1891", "refsource": "OSVDB", "url": "http://www.osvdb.org/1891" }, { "name": "2983", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2983" }, { "name": "VU#654643", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/654643" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1084", "datePublished": "2002-06-25T04:00:00", "dateReserved": "2002-03-15T00:00:00", "dateUpdated": "2024-08-08T04:44:07.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null)." } ], "id": "CVE-2002-0937", "lastModified": "2024-11-20T23:40:13.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-04T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9339.php" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0095.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9339.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4997" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-05-03 04:00
Modified
2024-11-20 23:34
Severity ?
Summary
Allaire JRun 3.0 allows remote attackers to list contents of the WEB-INF directory, and the web.xml file in the WEB-INF directory, via a malformed URL that contains a "."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allaire JRun 3.0 allows remote attackers to list contents of the WEB-INF directory, and the web.xml file in the WEB-INF directory, via a malformed URL that contains a \".\"" } ], "id": "CVE-2001-0179", "lastModified": "2024-11-20T23:34:47.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-05-03T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=19546\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=19546\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:42
Severity ?
Summary
Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot (\"WEB-INF.\")." } ], "id": "CVE-2002-1855", "lastModified": "2024-11-20T23:42:17.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/279582" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/9446.php" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/5119" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/279582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/9446.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/5119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-05 04:00
Modified
2024-11-20 23:49
Severity ?
Summary
The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in ";.cfm".
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hitachi | cosminexus_enterprise | 01_01_1 | |
hitachi | cosminexus_enterprise | 01_01_1 | |
hitachi | cosminexus_enterprise | 01_02_2 | |
hitachi | cosminexus_enterprise | 01_02_2 | |
hitachi | cosminexus_server | web_01-01_1 | |
hitachi | cosminexus_server | web_01-01_2 | |
macromedia | coldfusion | 6.0 | |
macromedia | coldfusion | 6.1 | |
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hitachi:cosminexus_enterprise:01_01_1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "891FA9C7-424C-4362-AEF7-E7A56FA7BF54", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_enterprise:01_01_1:*:standard:*:*:*:*:*", "matchCriteriaId": "9FB3092D-DC29-440E-8A62-B0352AECDC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_enterprise:01_02_2:*:enterprise:*:*:*:*:*", "matchCriteriaId": "1AA9C36C-CF0A-46D1-B74D-BF33BEFABADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_enterprise:01_02_2:*:standard:*:*:*:*:*", "matchCriteriaId": "761C4CAD-4364-4BD9-BD4B-BC430D428D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_server:web_01-01_1:*:*:*:*:*:*:*", "matchCriteriaId": "B580CCB0-BDBC-4048-AA4C-E2330801E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_server:web_01-01_2:*:*:*:*:*:*:*", "matchCriteriaId": "C5E388BD-09D5-494B-98DD-DF30EA9F26A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B79C39FD-D9A0-4CA4-BF37-D94D9F20E4C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C65BE0-32FA-4D51-AA2B-E7D630470D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in \";.cfm\"." } ], "id": "CVE-2004-0928", "lastModified": "2024-11-20T23:49:42.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-05T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12638/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12647/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=148\u0026type=vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/977440" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11245" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12638/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12647/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=148\u0026type=vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/977440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17484" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Directory traversal vulnerability in Allaire JRun 2.3 server allows remote attackers to read arbitrary files via the SSIFilter servlet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3.x |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3.x:*:*:*:*:*:*:*", "matchCriteriaId": "9C0A179E-281A-441B-B5B0-04D839E363D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Allaire JRun 2.3 server allows remote attackers to read arbitrary files via the SSIFilter servlet." } ], "id": "CVE-2000-1051", "lastModified": "2024-11-20T23:33:54.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17968\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17968\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5405" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-03-15 05:00
Modified
2024-11-20 23:51
Severity ?
Summary
Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | coldfusion | 6.0 | |
macromedia | coldfusion | 6.1 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0_build_61650 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B79C39FD-D9A0-4CA4-BF37-D94D9F20E4C1", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C65BE0-32FA-4D51-AA2B-E7D630470D19", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "7C101B23-DD69-4020-A252-A808925DB093", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1a:*:*:*:*:*:*", "matchCriteriaId": "7490205B-E8CF-4088-8FD7-3CEE672E2A10", "vulnerable": false }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0_build_61650:*:*:*:*:*:*:*", "matchCriteriaId": "75E7B136-FAC8-4105-825F-6CC31A76E64B", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*", "matchCriteriaId": "0F6B3BC6-9A4B-40E7-A540-9BCFC3D02E66", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*", "matchCriteriaId": "9760BDBA-E5FD-4AFF-ACB8-4C8B55CC3A61", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*", "matchCriteriaId": "37553E5D-7B68-40C4-B970-FA0D02B7D3D9", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*", "matchCriteriaId": "3D089210-2135-4D41-92AD-51FB97AB343E", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*", "matchCriteriaId": "C2C8EF3B-1A44-4D15-B2BE-FC970281760C", "vulnerable": false }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*", "matchCriteriaId": "E3597345-9D0B-492B-99BC-1C992EBF7CD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption)." } ], "id": "CVE-2004-1816", "lastModified": "2024-11-20T23:51:48.623", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-03-15T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11130" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9877" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-11-28 05:00
Modified
2024-11-20 23:36
Severity ?
Summary
SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request's body has an #include statement.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3.3 | |
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA955BB7-2B8A-4534-A0F6-AEBD6875EB12", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request\u0027s body has an #include statement." } ], "id": "CVE-2001-0926", "lastModified": "2024-11-20T23:36:27.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-11-28T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=100697797325013\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22261\u0026Method=Full" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3589" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=100697797325013\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22261\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7622" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-08-12 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
Buffer overflow in the ISAPI DLL filter for Macromedia JRun 3.1 allows remote attackers to execute arbitrary code via a direct request to the filter with a long HTTP host header field in a URL for a .jsp file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the ISAPI DLL filter for Macromedia JRun 3.1 allows remote attackers to execute arbitrary code via a direct request to the filter with a long HTTP host header field in a URL for a .jsp file." } ], "id": "CVE-2002-0801", "lastModified": "2024-11-20T23:39:54.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-08-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0085.html" }, { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/274528" }, { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/274601" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-14.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9194.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/703835" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5082" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0085.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/274528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/274601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2002-14.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9194.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/703835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4873" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-12-31 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3.3 | |
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA955BB7-2B8A-4534-A0F6-AEBD6875EB12", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request." } ], "id": "CVE-2001-1544", "lastModified": "2024-11-20T23:37:56.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/7678.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22290\u0026Method=Full" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/3666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/7678.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22290\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/3666" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user's HTTP session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hitachi | cosminexus_enterprise | 01_01_1 | |
hitachi | cosminexus_enterprise | 01_01_1 | |
hitachi | cosminexus_enterprise | 01_02_2 | |
hitachi | cosminexus_enterprise | 01_02_2 | |
hitachi | cosminexus_server | web_01-01_1 | |
hitachi | cosminexus_server | web_01-01_2 | |
macromedia | coldfusion | 6.0 | |
macromedia | coldfusion | 6.1 | |
macromedia | coldfusion | 6.1 | |
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hitachi:cosminexus_enterprise:01_01_1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "891FA9C7-424C-4362-AEF7-E7A56FA7BF54", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_enterprise:01_01_1:*:standard:*:*:*:*:*", "matchCriteriaId": "9FB3092D-DC29-440E-8A62-B0352AECDC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_enterprise:01_02_2:*:enterprise:*:*:*:*:*", "matchCriteriaId": "1AA9C36C-CF0A-46D1-B74D-BF33BEFABADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_enterprise:01_02_2:*:standard:*:*:*:*:*", "matchCriteriaId": "761C4CAD-4364-4BD9-BD4B-BC430D428D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_server:web_01-01_1:*:*:*:*:*:*:*", "matchCriteriaId": "B580CCB0-BDBC-4048-AA4C-E2330801E6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:cosminexus_server:web_01-01_2:*:*:*:*:*:*:*", "matchCriteriaId": "C5E388BD-09D5-494B-98DD-DF30EA9F26A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B79C39FD-D9A0-4CA4-BF37-D94D9F20E4C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C65BE0-32FA-4D51-AA2B-E7D630470D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.1:*:j2ee_application_server:*:*:*:*:*", "matchCriteriaId": "5E448558-A9F6-4506-AA6D-688C73CEC61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user\u0027s HTTP session." } ], "id": "CVE-2004-1478", "lastModified": "2024-11-20T23:50:59.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12638/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584958" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11245" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12638/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17481" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:52
Severity ?
Summary
Session fixation vulnerability in Macromedia JRun 4.0 allows remote attackers to hijack user sessions by pre-setting the user session ID information used by the session server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0_build_61650 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "7C101B23-DD69-4020-A252-A808925DB093", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1a:*:*:*:*:*:*", "matchCriteriaId": "7490205B-E8CF-4088-8FD7-3CEE672E2A10", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0_build_61650:*:*:*:*:*:*:*", "matchCriteriaId": "75E7B136-FAC8-4105-825F-6CC31A76E64B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Session fixation vulnerability in Macromedia JRun 4.0 allows remote attackers to hijack user sessions by pre-setting the user session ID information used by the session server." } ], "id": "CVE-2004-2182", "lastModified": "2024-11-20T23:52:42.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/11414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/11414" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-12-31 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
Unknown vulnerability in Allaire JRun 3.1 allows remote attackers to directly access the WEB-INF and META-INF directories and execute arbitrary JavaServer Pages (JSP), a variant of CVE-2000-1050.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Allaire JRun 3.1 allows remote attackers to directly access the WEB-INF and META-INF directories and execute arbitrary JavaServer Pages (JSP), a variant of CVE-2000-1050." } ], "id": "CVE-2001-1512", "lastModified": "2024-11-20T23:37:51.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/7677.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22287" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/7677.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3662" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-12-31 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing." } ], "id": "CVE-2001-1545", "lastModified": "2024-11-20T23:37:56.577", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/7679.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22291\u0026Method=Full" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/3665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/7679.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22291\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/3665" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-03-15 05:00
Modified
2024-11-20 23:51
Severity ?
Summary
Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | coldfusion | 6.0 | |
macromedia | coldfusion | 6.1 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0_build_61650 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 | |
sun | one_application_server | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B79C39FD-D9A0-4CA4-BF37-D94D9F20E4C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C65BE0-32FA-4D51-AA2B-E7D630470D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "7C101B23-DD69-4020-A252-A808925DB093", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1a:*:*:*:*:*:*", "matchCriteriaId": "7490205B-E8CF-4088-8FD7-3CEE672E2A10", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0_build_61650:*:*:*:*:*:*:*", "matchCriteriaId": "75E7B136-FAC8-4105-825F-6CC31A76E64B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*", "matchCriteriaId": "0F6B3BC6-9A4B-40E7-A540-9BCFC3D02E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*", "matchCriteriaId": "9760BDBA-E5FD-4AFF-ACB8-4C8B55CC3A61", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*", "matchCriteriaId": "37553E5D-7B68-40C4-B970-FA0D02B7D3D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*", "matchCriteriaId": "3D089210-2135-4D41-92AD-51FB97AB343E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*", "matchCriteriaId": "C2C8EF3B-1A44-4D15-B2BE-FC970281760C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*", "matchCriteriaId": "E3597345-9D0B-492B-99BC-1C992EBF7CD5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption)." } ], "id": "CVE-2004-1815", "lastModified": "2024-11-20T23:51:48.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-03-15T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11132" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9877" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107936690702515\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15473" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-11 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
Macromedia JRun Administration Server allows remote attackers to bypass authentication on the login form via an extra slash (/) in the URL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Macromedia JRun Administration Server allows remote attackers to bypass authentication on the login form via an extra slash (/) in the URL." }, { "lang": "es", "value": "Macromedia JRun Administration Server permite a atacantes remotos evitar la autenticaci\u00f3n para entrar en el sistema, mediante un caracter \u0027/\u0027 extra en la URL." } ], "id": "CVE-2002-0665", "lastModified": "2024-11-20T23:39:35.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0133.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=102529402127195\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/9450.php" }, { "source": "cve@mitre.org", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0133.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=102529402127195\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/9450.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5118" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-12-31 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) "%3f.jsp", (2) "?.jsp" or (3) "?" to the requested URL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3.3 | |
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA955BB7-2B8A-4534-A0F6-AEBD6875EB12", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) \"%3f.jsp\", (2) \"?.jsp\" or (3) \"?\" to the requested URL." } ], "id": "CVE-2001-1510", "lastModified": "2024-11-20T23:37:51.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2" }, { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/243203" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.iss.net/security_center/static/7623.php" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22262\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/243636" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/243203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.iss.net/security_center/static/7623.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22262\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/243636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3592" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-12-31 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) "jsp%00" or (2) "js%2570".
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.iss.net/security_center/static/7676.php | Exploit, Patch | |
cve@mitre.org | http://www.macromedia.com/v1/handlers/index.cfm?ID=22288&Method=Full | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/7676.php | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.macromedia.com/v1/handlers/index.cfm?ID=22288&Method=Full | Exploit, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) \"jsp%00\" or (2) \"js%2570\"." } ], "id": "CVE-2001-1511", "lastModified": "2024-11-20T23:37:51.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.iss.net/security_center/static/7676.php" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22288\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.iss.net/security_center/static/7676.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22288\u0026Method=Full" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Allaire JRun 2.3 server allows remote attackers to obtain source code for executable content by directly calling the SSIFilter servlet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3.x |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3.x:*:*:*:*:*:*:*", "matchCriteriaId": "9C0A179E-281A-441B-B5B0-04D839E363D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allaire JRun 2.3 server allows remote attackers to obtain source code for executable content by directly calling the SSIFilter servlet." } ], "id": "CVE-2000-1052", "lastModified": "2024-11-20T23:33:54.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=97236692714978\u0026w=2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-07-02 04:00
Modified
2024-11-20 23:36
Severity ?
Summary
Cross-site scripting vulnerability in Allaire JRun 3.0 and 2.3.3 allows a malicious webmaster to embed Javascript in a request for a .JSP, .shtml, .jsp10, .jrun, or .thtml file that does not exist, which causes the Javascript to be inserted into an error message.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3.3 | |
macromedia | jrun | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DA955BB7-2B8A-4534-A0F6-AEBD6875EB12", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Allaire JRun 3.0 and 2.3.3 allows a malicious webmaster to embed Javascript in a request for a .JSP, .shtml, .jsp10, .jrun, or .thtml file that does not exist, which causes the Javascript to be inserted into an error message." } ], "id": "CVE-2001-1084", "lastModified": "2024-11-20T23:36:50.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-07-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/654643" }, { "source": "cve@mitre.org", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=21498\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/1891" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2983" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/654643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=21498\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/1891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6793" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Allaire JRun 3.0 http servlet server allows remote attackers to cause a denial of service via a URL that contains a long string of "." characters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "EF7B2456-5820-4B72-9375-4945B95F371E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allaire JRun 3.0 http servlet server allows remote attackers to cause a denial of service via a URL that contains a long string of \".\" characters." } ], "id": "CVE-2000-1049", "lastModified": "2024-11-20T23:33:53.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=97310314724964\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=18085\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=97310314724964\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=18085\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5452" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-12-31 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
Macromedia JRun 3.0 and 3.1 allows remote attackers to obtain duplicate active user session IDs and perform actions as other users via a URL request for the web application directory without the trailing '/' (slash), as demonstrated using ctx.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Macromedia JRun 3.0 and 3.1 allows remote attackers to obtain duplicate active user session IDs and perform actions as other users via a URL request for the web application directory without the trailing \u0027/\u0027 (slash), as demonstrated using ctx." } ], "id": "CVE-2001-1513", "lastModified": "2024-11-20T23:37:51.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/7680.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22260\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/7680.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=22260\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3600" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-06-22 04:00
Modified
2024-11-20 23:32
Severity ?
Summary
Servlet examples in Allaire JRun 2.3.x allow remote attackers to obtain sensitive information, e.g. listing HttpSession ID's via the SessionServlet servlet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8587E5C8-193F-4A2B-965D-0ACC7429C7D7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Servlet examples in Allaire JRun 2.3.x allow remote attackers to obtain sensitive information, e.g. listing HttpSession ID\u0027s via the SessionServlet servlet." } ], "id": "CVE-2000-0539", "lastModified": "2024-11-20T23:32:44.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-06-22T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/818" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1386" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-06-22 04:00
Modified
2024-11-20 23:32
Severity ?
Summary
JSP sample files in Allaire JRun 2.3.x allow remote attackers to access arbitrary files (e.g. via viewsource.jsp) or obtain configuration information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8587E5C8-193F-4A2B-965D-0ACC7429C7D7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JSP sample files in Allaire JRun 2.3.x allow remote attackers to access arbitrary files (e.g. via viewsource.jsp) or obtain configuration information." } ], "id": "CVE-2000-0540", "lastModified": "2024-11-20T23:32:44.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-06-22T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/2713" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1386" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=16290\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/2713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4774" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Allaire JRun 2.3.3 server allows remote attackers to compile and execute JSP code by inserting it via a cross-site scripting (CSS) attack and directly calling the com.livesoftware.jrun.plugins.JSP JSP servlet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 2.3.x |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:2.3.x:*:*:*:*:*:*:*", "matchCriteriaId": "9C0A179E-281A-441B-B5B0-04D839E363D3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allaire JRun 2.3.3 server allows remote attackers to compile and execute JSP code by inserting it via a cross-site scripting (CSS) attack and directly calling the com.livesoftware.jrun.plugins.JSP JSP servlet." } ], "id": "CVE-2000-1053", "lastModified": "2024-11-20T23:33:54.257", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=97236125107957\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17969\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=97236125107957\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17969\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5406" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-22 00:03
Modified
2024-11-21 00:04
Severity ?
Summary
Stack-based buffer overflow in the Macromedia JRun 4 web server (JWS) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long request that is not properly handled during conversion to wide characters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0_build_61650 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "7C101B23-DD69-4020-A252-A808925DB093", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1a:*:*:*:*:*:*", "matchCriteriaId": "7490205B-E8CF-4088-8FD7-3CEE672E2A10", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0_build_61650:*:*:*:*:*:*:*", "matchCriteriaId": "75E7B136-FAC8-4105-825F-6CC31A76E64B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Macromedia JRun 4 web server (JWS) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long request that is not properly handled during conversion to wide characters." } ], "id": "CVE-2005-4472", "lastModified": "2024-11-21T00:04:20.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-22T00:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18077" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/283" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015370" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=360" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15905" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16026" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/283" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=360" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2949" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-22 00:03
Modified
2024-11-21 00:04
Severity ?
Summary
Unspecified vulnerability in Macromedia JRun 4 web server (JWS) allows remote attackers to view web application source code via "a malformed URL."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0 | |
macromedia | jrun | 4.0_build_61650 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "7C101B23-DD69-4020-A252-A808925DB093", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:sp1a:*:*:*:*:*:*", "matchCriteriaId": "7490205B-E8CF-4088-8FD7-3CEE672E2A10", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0_build_61650:*:*:*:*:*:*:*", "matchCriteriaId": "75E7B136-FAC8-4105-825F-6CC31A76E64B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Macromedia JRun 4 web server (JWS) allows remote attackers to view web application source code via \"a malformed URL.\"" } ], "id": "CVE-2005-4473", "lastModified": "2024-11-21T00:04:20.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-22T00:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18077" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015370" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15905" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2949" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Allaire JRun 3.0 http servlet server allows remote attackers to directly access the WEB-INF directory via a URL request that contains an extra "/" in the beginning of the request (aka the "extra leading slash").
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "EF7B2456-5820-4B72-9375-4945B95F371E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allaire JRun 3.0 http servlet server allows remote attackers to directly access the WEB-INF directory via a URL request that contains an extra \"/\" in the beginning of the request (aka the \"extra leading slash\")." } ], "id": "CVE-2000-1050", "lastModified": "2024-11-20T23:33:53.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=97236316510117\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17966\u0026Method=Full" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/500" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=97236316510117\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.allaire.com/handlers/index.cfm?ID=17966\u0026Method=Full" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5407" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:43
Severity ?
Summary
Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL." } ], "id": "CVE-2002-2186", "lastModified": "2024-11-20T23:43:04.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/10570.php" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/10570.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6126" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | coldfusion | 6.0 | |
macromedia | coldfusion | 6.1 | |
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B79C39FD-D9A0-4CA4-BF37-D94D9F20E4C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C65BE0-32FA-4D51-AA2B-E7D630470D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n WriteToLog de los conectores web JRun 3.0 a 4.0, como mod_jrun y mod_jrun20 para Apache con registro verboso activado, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una una cabecera HTTP Content-Type larga u otros campos." } ], "id": "CVE-2004-0646", "lastModified": "2024-11-20T23:49:03.713", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12647/" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/990200" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "cve@mitre.org", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/377194" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11245" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17485" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12647/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/990200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/377194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17485" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-11-29 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE446E13-51EB-4262-998F-952121B93ADC", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en el mont\u00f3n (heap) en el mecanismo de manejo de errores en el manejador de IIS ISAPI en Macromedia JRun 4.0 y anteriores permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante una petic\u00f3n HTTP GET con un nombre de fichero .jsp largo." } ], "id": "CVE-2002-1310", "lastModified": "2024-11-20T23:41:01.383", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-11-29T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026r=1\u0026b=200211\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/6122" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026r=1\u0026b=200211\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/6122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed." } ], "id": "CVE-2002-1025", "lastModified": "2024-11-20T23:40:25.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-04T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html" }, { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/280062" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9459.php" }, { "source": "cve@mitre.org", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5028" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/280062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9459.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5134" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-07-19 04:00
Modified
2024-11-20 23:59
Severity ?
Summary
Race condition in Macromedia JRun 4.0, ColdFusion MX 6.1 and 7.0, when under heavy load, causes JRun to assign a duplicate authentication token to multiple sessions, which could allow authenticated users to gain privileges as other users.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | coldfusion | 6.1 | |
macromedia | coldfusion | 7.0 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C65BE0-32FA-4D51-AA2B-E7D630470D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:coldfusion:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "921E5A6D-8476-401B-9A18-BDBC07CA1CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in Macromedia JRun 4.0, ColdFusion MX 6.1 and 7.0, when under heavy load, causes JRun to assign a duplicate authentication token to multiple sessions, which could allow authenticated users to gain privileges as other users." }, { "lang": "es", "value": "\"Race condition\" en Macromedia JRun 4.0, ColdFusion MX 6.1 y 7.0 cuando est\u00e1n bajo carga pesada, provocan que JRun asigne una autentifcaci\u00f3n duplicada a sesiones m\u00faltiples, lo que podr\u00eda permitir que usuarios autentificados obtengan privilegios como otros usuarios." } ], "id": "CVE-2005-2306", "lastModified": "2024-11-20T23:59:15.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-07-19T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16081" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014489" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-05.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:43
Severity ?
Summary
Unknown "file disclosure" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown \"file disclosure\" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact." } ], "id": "CVE-2002-2187", "lastModified": "2024-11-20T23:43:05.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/10571.php" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.iss.net/security_center/static/10571.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.macromedia.com/v1/Handlers/index.cfm?ID=23500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/6125" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Management Console in JRun 4.0 allows remote attackers to execute arbitrary web script or HTML and possibly hijack a user's session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
macromedia | jrun | 3.0 | |
macromedia | jrun | 3.1 | |
macromedia | jrun | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "96D6C1D6-F9AF-4CF0-9F80-AB2C20C7615C", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "462BA0C4-D941-4C58-86DF-BF76663723F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4361030D-230A-45CD-AC84-9603DADC75BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Management Console in JRun 4.0 allows remote attackers to execute arbitrary web script or HTML and possibly hijack a user\u0027s session." } ], "id": "CVE-2004-1477", "lastModified": "2024-11-20T23:50:59.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/12638/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/668206" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11245" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109621995623823\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/12638/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/668206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17483" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }