Page 2 of 28 results (0.001 seconds)

CVSS: 9.4EPSS: 1%CPEs: 2EXPL: 0

16 May 2007 — Caucho Resin Professional 3.1.0 and Caucho Resin 3.1.0 and earlier for Windows allows remote attackers to cause a denial of service (device hang) and read data from a COM or LPT device via a DOS device name with an arbitrary extension. Caucho Resin Professional 3.1.0 y Caucho Resin 3.1.0 y anteriores para Windows permite a atacantes remotos provocar una denegación de servicio (cuelgue del dispositivo) y leer datos de un dispositivo COM o LPT mediante un nombre de dispositivo DOS con una extensión arbitraria... • http://osvdb.org/36059 •

CVSS: 7.5EPSS: 9%CPEs: 2EXPL: 2

16 May 2007 — Directory traversal vulnerability in Caucho Resin Professional 3.1.0 and Caucho Resin 3.1.0 and earlier for Windows allows remote attackers to read certain files via a .. (dot dot) in a URI containing a "\web-inf" sequence. Vulnerabilidad de cruce de directorio en Caucho Resin Professional 3.1.0 y Caucho Resin 3.1.0 y anteriores para Windows permite a atacantes remotos leer ciertos ficheros mediante una secuencia .. (punto punto) en un URI que contiene la secuencia "\web-inf". • https://www.exploit-db.com/exploits/30038 •

CVSS: 5.3EPSS: 9%CPEs: 2EXPL: 1

16 May 2007 — Caucho Resin Professional 3.1.0 and Caucho Resin 3.1.0 and earlier for Windows allows remote attackers to obtain the system path via certain URLs associated with (1) deploying web applications or (2) displaying .xtp files. Caucho Resin Professional 3.1.0 y Caucho Resin 3.1.0 y versiones anteriores para Windows permiten a atacantes remotos obtener la ruta del sistema mediante URLs concretas asociadas con (1) desplegando aplicaciones web ó (2) visualizando .xtp files. • https://www.exploit-db.com/exploits/30037 •

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 3

17 May 2006 — The viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to obtain the source code for file under the web root via the file parameter. • https://www.exploit-db.com/exploits/27888 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

17 May 2006 — Directory traversal vulnerability in the viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to read arbitrary files under other web roots via the contextpath parameter. NOTE: this issue can produce resultant path disclosure when the parameter is invalid. • http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0384.html •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

17 May 2006 — Directory traversal vulnerability in Caucho Resin 3.0.17 and 3.0.18 for Windows allows remote attackers to read arbitrary files via a "C:%5C" (encoded drive letter) in a URL. • http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0026.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

18 Mar 2004 — Caucho Technology Resin 2.1.12 allows remote attackers to view JSP source via an HTTP request to a .jsp file that ends in a "%20" (encoded space character), e.g. index.jsp%20. Caucho Technology Resin 2.1.21 permite a atacantes remotos ver la fuente JSP mediante una petición a un fichero .jsp que acaba en un carácter "%20" (espacio codificado en URL), por ejemplo index.jsp%20. • http://marc.info/?l=bugtraq&m=107635084830547&w=2 •

CVSS: 7.5EPSS: 13%CPEs: 1EXPL: 2

18 Mar 2004 — Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for "WEB-INF..", which is equivalent to "WEB-INF" in Windows. Caucho Technology Resin 2.1.12 permite a atacantes remotos obtener información sensible y ver los contenidos del directorio /WEB-INF/ mediante una petición HTTP de "WEB-INF • https://www.exploit-db.com/exploits/23671 •

CVSS: 6.1EPSS: 0%CPEs: 4EXPL: 3

31 Dec 2003 — Multiple cross-site scripting (XSS) vulnerabilities in example scripts in Caucho Technology Resin 2.0 through 2.1.2 allow remote attackers to inject arbitrary web script or HTML via (1) env.jsp, (2) form.jsp, (3) session.jsp, (4) the move parameter to tictactoe.jsp, or the (5) name or (6) comment fields to guestbook.jsp. • https://www.exploit-db.com/exploits/23262 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — Directory traversal vulnerability in view_source.jsp in Resin 2.1.2 allows remote attackers to read arbitrary files via a "\.." (backslash dot dot). • http://online.securityfocus.com/archive/1/277225 •