JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Nov 2024, 23:40
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html - | |
| References | () http://online.securityfocus.com/archive/1/280062 - | |
| References | () http://www.iss.net/security_center/static/9459.php - Patch, Vendor Advisory | |
| References | () http://www.macromedia.com/v1/handlers/index.cfm?ID=23164 - | |
| References | () http://www.osvdb.org/5028 - | |
| References | () http://www.securityfocus.com/bid/5134 - Exploit, Patch, Vendor Advisory | 
Information
                Published : 2002-10-04 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-1025
Mitre link : CVE-2002-1025
CVE.ORG link : CVE-2002-1025
JSON object : View
Products Affected
                macromedia
- jrun
CWE
                