Unspecified vulnerability in Macromedia JRun 4 web server (JWS) allows remote attackers to view web application source code via "a malformed URL."
Max CVSS
5.0
EPSS Score
0.52%
Published
2005-12-22
Updated
2011-03-08
Stack-based buffer overflow in the Macromedia JRun 4 web server (JWS) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long request that is not properly handled during conversion to wide characters.
Max CVSS
7.5
EPSS Score
9.86%
Published
2005-12-22
Updated
2011-03-08
Race condition in Macromedia JRun 4.0, ColdFusion MX 6.1 and 7.0, when under heavy load, causes JRun to assign a duplicate authentication token to multiple sessions, which could allow authenticated users to gain privileges as other users.
Max CVSS
3.7
EPSS Score
0.05%
Published
2005-07-19
Updated
2008-09-05
Session fixation vulnerability in Macromedia JRun 4.0 allows remote attackers to hijack user sessions by pre-setting the user session ID information used by the session server.
Max CVSS
7.5
EPSS Score
0.34%
Published
2004-12-31
Updated
2008-09-05
Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption).
Max CVSS
5.0
EPSS Score
28.06%
Published
2004-03-15
Updated
2017-07-11
JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user's HTTP session.
Max CVSS
7.5
EPSS Score
0.99%
Published
2004-12-31
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in the Management Console in JRun 4.0 allows remote attackers to execute arbitrary web script or HTML and possibly hijack a user's session.
Max CVSS
4.3
EPSS Score
0.44%
Published
2004-12-31
Updated
2017-07-11
The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in ";.cfm".
Max CVSS
5.0
EPSS Score
13.89%
Published
2004-10-05
Updated
2017-07-11
Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields.
Max CVSS
10.0
EPSS Score
8.23%
Published
2004-12-23
Updated
2017-07-11
Unknown "file disclosure" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact.
Max CVSS
5.0
EPSS Score
0.14%
Published
2002-12-31
Updated
2008-09-05
Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL.
Max CVSS
5.0
EPSS Score
0.23%
Published
2002-12-31
Updated
2008-09-05
Macromedia JRun 3.0 through 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
Max CVSS
5.0
EPSS Score
0.21%
Published
2002-12-31
Updated
2008-09-05
Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name.
Max CVSS
7.5
EPSS Score
1.00%
Published
2002-11-29
Updated
2017-07-11
JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed.
Max CVSS
5.0
EPSS Score
0.67%
Published
2002-10-04
Updated
2008-09-05
The Java Server Pages (JSP) engine in JRun allows web page owners to cause a denial of service (engine crash) on the web server via a JSP page that calls WPrinterJob().pageSetup(null,null).
Max CVSS
5.0
EPSS Score
0.67%
Published
2002-10-04
Updated
2008-09-05
Buffer overflow in the ISAPI DLL filter for Macromedia JRun 3.1 allows remote attackers to execute arbitrary code via a direct request to the filter with a long HTTP host header field in a URL for a .jsp file.
Max CVSS
10.0
EPSS Score
17.40%
Published
2002-08-12
Updated
2008-09-05
Macromedia JRun Administration Server allows remote attackers to bypass authentication on the login form via an extra slash (/) in the URL.
Max CVSS
10.0
EPSS Score
1.97%
Published
2002-07-11
Updated
2016-10-18
Macromedia JRun 3.0 and 3.1 appends the jsessionid to URL requests (a.k.a. rewriting) when client browsers have cookies enabled, which allows remote attackers to obtain session IDs and hijack sessions via HTTP referrer fields or sniffing.
Max CVSS
5.0
EPSS Score
0.22%
Published
2001-12-31
Updated
2008-09-05
Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request.
Max CVSS
5.0
EPSS Score
0.22%
Published
2001-12-31
Updated
2008-09-05
Macromedia JRun 3.0 and 3.1 allows remote attackers to obtain duplicate active user session IDs and perform actions as other users via a URL request for the web application directory without the trailing '/' (slash), as demonstrated using ctx.
Max CVSS
7.5
EPSS Score
1.45%
Published
2001-12-31
Updated
2008-09-10
Unknown vulnerability in Allaire JRun 3.1 allows remote attackers to directly access the WEB-INF and META-INF directories and execute arbitrary JavaServer Pages (JSP), a variant of CVE-2000-1050.
Max CVSS
6.4
EPSS Score
0.62%
Published
2001-12-31
Updated
2008-09-10
JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) "jsp%00" or (2) "js%2570".
Max CVSS
5.0
EPSS Score
0.26%
Published
2001-12-31
Updated
2008-09-05
Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) "%3f.jsp", (2) "?.jsp" or (3) "?" to the requested URL.
Max CVSS
5.0
EPSS Score
0.67%
Published
2001-12-31
Updated
2008-09-05
Cross-site scripting vulnerability in Allaire JRun 3.0 and 2.3.3 allows a malicious webmaster to embed Javascript in a request for a .JSP, .shtml, .jsp10, .jrun, or .thtml file that does not exist, which causes the Javascript to be inserted into an error message.
Max CVSS
7.5
EPSS Score
1.00%
Published
2001-07-02
Updated
2017-10-10
SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request's body has an #include statement.
Max CVSS
5.0
EPSS Score
0.36%
Published
2001-11-28
Updated
2017-12-19
33 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!