Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bajie java http server vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0308
UploadServlet in Bajie HTTP JServer 0.78, and possibly other versions prior to 0.80, allows remote malicious users to execute arbitrary commands by calling the servlet to upload a program, then using a ... (modified ..) to access the file that was created for the program.
Bajie Java Http Server
1 EDB exploit
NA
CVE-2001-0307
Bajie HTTP JServer 0.78, and other versions prior to 0.80, allows remote malicious users to execute arbitrary commands via shell metacharacters in an HTTP request for a CGI program that does not exist.
Bajie Java Http Server
1 EDB exploit
NA
CVE-2000-0773
Bajie HTTP web server 0.30a allows remote malicious users to read arbitrary files via a URL that contains a "....", a variant of the dot dot directory traversal attack.
Bajie Java Http Server 1.0
NA
CVE-2000-0774
The sample Java servlet "test" in Bajie HTTP web server 0.30a reveals the real pathname of the web document root.
Bajie Java Http Server 1.0
NA
CVE-2003-1511
Cross-site scripting (XSS) vulnerability in Bajie Java HTTP Server 0.95 up to and including 0.95zxv4 allows remote malicious users to inject arbitrary web script or HTML via (1) the query string to test.txt, (2) the guestName parameter to the custMsg servlet, or (3) the cookienam...
Bajie Java Http Server 0.95
1 EDB exploit
NA
CVE-2003-1543
Cross-site scripting (XSS) vulnerability in Bajie Http Web Server 0.95zxe, 0.95zxc, and possibly others, allows remote malicious users to inject arbitrary web script or HTML via the query string, which is reflected in an error message.
Bajie Java Http Server 0.95
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started