
CVE-2021-44138
https://notcve.org/view.php?id=CVE-2021-44138
04 Apr 2022 — There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request. Se presenta una vulnerabilidad de salto de directorio en Caucho Resin, distribuido en Resin versiones 4.0.52 - 4.0.56, que permite a atacantes remotos leer archivos en directorios arbitrarios por medio de un ; en un nombre de ruta dentro de una petición HTTP • https://github.com/maybe-why-not/reponame/issues/2 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2014-2966
https://notcve.org/view.php?id=CVE-2014-2966
26 Jul 2014 — The ISO-8859-1 encoder in Resin Pro before 4.0.40 does not properly perform Unicode transformations, which allows remote attackers to bypass intended text restrictions via crafted characters, as demonstrated by bypassing an XSS protection mechanism. El codificador ISO-8859-1 en Resin Pro anterior a 4.0.40 no realiza debidamente las transformaciones Unicode, lo que permite a atacantes remotos evadir las restricciones de texto a través de caracteres manipulados, tal y como fue demostrado mediante la evasión d... • http://caucho.com/products/resin/download#download • CWE-20: Improper Input Validation CWE-264: Permissions, Privileges, and Access Controls •

CVE-2012-2965
https://notcve.org/view.php?id=CVE-2012-2965
12 Aug 2012 — Caucho Quercus, as distributed in Resin before 4.0.29, does not properly handle unspecified characters in the names of variables, which has unknown impact and remote attack vectors, related to an "HTTP Parameter Contamination" issue. Caucho Quercus, tal y como se distribuye en Resin antes de v4.0.29, no trata correctamente los caracteres no especificados en los nombres de variables, lo cual tiene un impacto y vectores de ataque a distancia desconocidos. Se trata de un problema relacionado con una "contamina... • http://caucho.com/resin-4.0/changes/changes.xtp • CWE-20: Improper Input Validation •

CVE-2012-2966
https://notcve.org/view.php?id=CVE-2012-2966
12 Aug 2012 — Caucho Quercus, as distributed in Resin before 4.0.29, overwrites entries in the SERVER superglobal array on the basis of POST parameters, which has unspecified impact and remote attack vectors. Caucho Quercus, distribuido como (Resin) anterior a v4.0.29, sobre escribe entradas en el (array superglobal SERVER) a través de parámetros básicos de POST, lo cual tiene un impacto no especificado y podría suponer vectores remotos de ataque. • http://caucho.com/resin-4.0/changes/changes.xtp •

CVE-2012-2967
https://notcve.org/view.php?id=CVE-2012-2967
12 Aug 2012 — Caucho Quercus, as distributed in Resin before 4.0.29, does not properly implement the == (equals sign equals sign) operator for comparisons, which has unspecified impact and context-dependent attack vectors. Caucho Quercus, tal y como se distribuye en Resib antes de v4.0.29, no implementa correctamente el operador == (signo igual, signo igual) para las comparaciones, lo cual tiene un impacto no especificado y vectores de ataque dependientes del contexto. • http://caucho.com/resin-4.0/changes/changes.xtp •

CVE-2012-2968
https://notcve.org/view.php?id=CVE-2012-2968
12 Aug 2012 — Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request. Vulnerabilidad de directorio transversal en Caucho Quercus, distribuido como (Resin) anterior a v4.0.29, permite a atacantes remotos crear archivos en directorios arbitrario a través de .. (punto punto) en una ruta de acceso dentro de una petición HTTP. • http://caucho.com/resin-4.0/changes/changes.xtp • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2012-2969
https://notcve.org/view.php?id=CVE-2012-2969
12 Aug 2012 — Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to bypass intended restrictions on filename extensions for created files via a %00 sequence in a pathname within an HTTP request. Caucho Quercus, tal y como se distribuye en Resin antes de v4.0.29, permite a atacantes remotos eludir las restricciones previstas en las extensiones de archivos para archivos creados con una secuencia 00% en la ruta de acceso dentro de una petición HTTP. • http://caucho.com/resin-4.0/changes/changes.xtp • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-2087
https://notcve.org/view.php?id=CVE-2010-2087
27 May 2010 — Oracle Mojarra 1.2_14 and 2.0.2, as used in IBM WebSphere Application Server, Caucho Resin, and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object. Oracle Mojarra v1.2_14 y v2.0.2, utilizado en IBM WebSphere Application Server, Caucho Resin, y otras aplicaciones, no maneja adecuadamente un estad... • http://www.blackhat.com/presentations/bh-dc-10/Byrne_David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2010-2032 – Caucho Resin Professional 3.1.5 - '/resin-admin/digest.php' Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2010-2032
24 May 2010 — Multiple cross-site scripting (XSS) vulnerabilities in resin-admin/digest.php in Caucho Technology Resin Professional 3.1.5, 3.1.10, 4.0.6, and possibly other versions allow remote attackers to inject arbitrary web script or HTML via the (1) digest_realm or (2) digest_username parameters. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en resin-admin/digest.php de Caucho Technology Resin Professional v3.1.5,... • https://www.exploit-db.com/exploits/34012 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2008-2462
https://notcve.org/view.php?id=CVE-2008-2462
30 Jun 2008 — Cross-site scripting (XSS) vulnerability in the viewfile documentation command in Caucho Resin before 3.0.25, and 3.1.x before 3.1.4, allows remote attackers to inject arbitrary web script or HTML via the file parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el comando de documentación viewfile de Caucho Resin antes de 3.0.25 y 3.1.x anterior a 3.1.4, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el parámetro file. • http://secunia.com/advisories/30845 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •