17 results (0.008 seconds)

CVSS: 9.4EPSS: 3%CPEs: 2EXPL: 0

Caucho Resin Professional 3.1.0 and Caucho Resin 3.1.0 and earlier for Windows allows remote attackers to cause a denial of service (device hang) and read data from a COM or LPT device via a DOS device name with an arbitrary extension. Caucho Resin Professional 3.1.0 y Caucho Resin 3.1.0 y anteriores para Windows permite a atacantes remotos provocar una denegación de servicio (cuelgue del dispositivo) y leer datos de un dispositivo COM o LPT mediante un nombre de dispositivo DOS con una extensión arbitraria. • http://osvdb.org/36059 http://secunia.com/advisories/25286 http://www.caucho.com/resin-3.1/changes/changes.xtp http://www.rapid7.com/advisories/R7-0028.jsp http://www.securitytracker.com/id?1018061 http://www.vupen.com/english/advisories/2007/1824 https://exchange.xforce.ibmcloud.com/vulnerabilities/34301 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 1

Caucho Resin Professional 3.1.0 and Caucho Resin 3.1.0 and earlier for Windows allows remote attackers to obtain the system path via certain URLs associated with (1) deploying web applications or (2) displaying .xtp files. Caucho Resin Professional 3.1.0 y Caucho Resin 3.1.0 y versiones anteriores para Windows permiten a atacantes remotos obtener la ruta del sistema mediante URLs concretas asociadas con (1) desplegando aplicaciones web ó (2) visualizando .xtp files. • https://www.exploit-db.com/exploits/30037 http://osvdb.org/36057 http://secunia.com/advisories/25286 http://www.caucho.com/resin-3.1/changes/changes.xtp http://www.rapid7.com/advisories/R7-0030.jsp http://www.securityfocus.com/bid/23985 http://www.securitytracker.com/id?1018061 http://www.vupen.com/english/advisories/2007/1824 https://exchange.xforce.ibmcloud.com/vulnerabilities/34293 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

Directory traversal vulnerability in Caucho Resin Professional 3.1.0 and Caucho Resin 3.1.0 and earlier for Windows allows remote attackers to read certain files via a .. (dot dot) in a URI containing a "\web-inf" sequence. Vulnerabilidad de cruce de directorio en Caucho Resin Professional 3.1.0 y Caucho Resin 3.1.0 y anteriores para Windows permite a atacantes remotos leer ciertos ficheros mediante una secuencia .. (punto punto) en un URI que contiene la secuencia "\web-inf". • https://www.exploit-db.com/exploits/30038 http://osvdb.org/36058 http://secunia.com/advisories/25286 http://www.caucho.com/resin-3.1/changes/changes.xtp http://www.rapid7.com/advisories/R7-0029.jsp http://www.securityfocus.com/bid/23985 http://www.securitytracker.com/id?1018061 http://www.vupen.com/english/advisories/2007/1824 https://exchange.xforce.ibmcloud.com/vulnerabilities/34296 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in Caucho Resin 3.0.17 and 3.0.18 for Windows allows remote attackers to read arbitrary files via a "C:%5C" (encoded drive letter) in a URL. • http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0026.html http://secunia.com/advisories/20125 http://securityreason.com/securityalert/904 http://securitytracker.com/id?1016109 http://www.osvdb.org/25570 http://www.rapid7.com/advisories/R7-0024.html http://www.securityfocus.com/archive/1/434150/100/0/threaded http://www.securityfocus.com/bid/18005 http://www.vupen.com/english/advisories/2006/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/26478 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

Directory traversal vulnerability in the viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to read arbitrary files under other web roots via the contextpath parameter. NOTE: this issue can produce resultant path disclosure when the parameter is invalid. • http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0384.html http://secunia.com/advisories/20125 http://securityreason.com/securityalert/908 http://securitytracker.com/id?1016110 http://www.osvdb.org/25571 http://www.securityfocus.com/archive/1/434145 http://www.securityfocus.com/bid/18007 http://www.vupen.com/english/advisories/2006/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/26494 •