Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
w3c jigsaw 2.2.1 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2004-2274
Unknown vulnerability in Jigsaw prior to 2.2.4 has unknown impact and attack vectors, possibly related to the parsing of the URI.
W3c Jigsaw 2.1
W3c Jigsaw 2.1.1
W3c Jigsaw 2.0.4
W3c Jigsaw 2.0.5
W3c Jigsaw 2.2.3
W3c Jigsaw 2.0.2
W3c Jigsaw 2.0.3
W3c Jigsaw 2.2.1
W3c Jigsaw 2.2.2
W3c Jigsaw 2.0
W3c Jigsaw 2.0.1
W3c Jigsaw 2.1.2
W3c Jigsaw 2.2
5
CVSSv2
CVE-2002-1052
Jigsaw 2.2.1 on Windows systems allows remote malicious users to use MS-DOS device names in HTTP requests to (1) cause a denial of service using the "con" device, or (2) obtain the physical path of the server using two requests to the "aux" device.
W3c Jigsaw 2.2.1
6.8
CVSSv2
CVE-2002-1053
Cross-site scripting (XSS) vulnerability in W3C Jigsaw Proxy Server prior to 2.2.1 allows remote malicious users to execute arbitrary script via a URL that contains a reference to a nonexistent host followed by the script, which is included in the resulting error message.
W3c Jigsaw 2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started