Vulnerability Details : CVE-2004-0928
The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in ";.cfm".
Products affected by CVE-2004-0928
- cpe:2.3:a:macromedia:jrun:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:jrun:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:jrun:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:cosminexus_enterprise:01_02_2:*:enterprise:*:*:*:*:*
- cpe:2.3:a:hitachi:cosminexus_enterprise:01_02_2:*:standard:*:*:*:*:*
- cpe:2.3:a:hitachi:cosminexus_enterprise:01_01_1:*:enterprise:*:*:*:*:*
- cpe:2.3:a:hitachi:cosminexus_enterprise:01_01_1:*:standard:*:*:*:*:*
- cpe:2.3:a:hitachi:cosminexus_server:web_01-01_1:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:cosminexus_server:web_01-01_2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0928
33.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0928
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2004-0928
-
http://www.idefense.com/application/poi/display?id=148&type=vulnerabilities
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/977440
Patch;Third Party Advisory;US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17484
-
http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/11245
Patch;Vendor Advisory
-
http://secunia.com/advisories/12647/
Patch;Vendor Advisory
-
http://www.macromedia.com/devnet/security/security_zone/mpsb04-09.html
Patch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=109621995623823&w=2
-
http://secunia.com/advisories/12638/
Patch;Vendor Advisory
Jump to