mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
88 lines
2.5 KiB
JSON
88 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2002-1025",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20020701 [VulnWatch] KPMG-2002026: Jrun sourcecode Disclosure",
|
|
"refsource" : "VULNWATCH",
|
|
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html"
|
|
},
|
|
{
|
|
"name" : "20020701 KPMG-2002026: Jrun sourcecode Disclosure",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://online.securityfocus.com/archive/1/280062"
|
|
},
|
|
{
|
|
"name" : "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.macromedia.com/v1/handlers/index.cfm?ID=23164"
|
|
},
|
|
{
|
|
"name" : "5134",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/5134"
|
|
},
|
|
{
|
|
"name" : "jrun-null-view-source(9459)",
|
|
"refsource" : "XF",
|
|
"url" : "http://www.iss.net/security_center/static/9459.php"
|
|
},
|
|
{
|
|
"name" : "5028",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/5028"
|
|
}
|
|
]
|
|
}
|
|
}
|