Page 3 of 28 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — Resin 2.1.1 allows remote attackers to cause a denial of service (memory consumption and hang) via a URL with long variables for non-existent resources. • http://online.securityfocus.com/archive/1/277232 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — Resin 2.1.1 allows remote attackers to cause a denial of service (thread and connection consumption) via multiple URL requests containing the DOS 'CON' device name and a registered file extension such as .jsp or .xtp. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0108.html •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2002 — Resin 2.0.5 through 2.1.2 allows remote attackers to reveal physical path information via a URL request for the example Java class file HelloServlet. • http://online.securityfocus.com/archive/1/278747 •

CVSS: 8.2EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2002 — Caucho Technology Resin server 2.1.1 to 2.1.2 allows remote attackers to obtain server's root path via requests for MS-DOS device names such as lpt9.xtp. • http://seclists.org/bugtraq/2002/Jul/0186.html •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

06 Dec 2001 — A cross-site scripting vulnerability in Caucho Technology Resin before 1.2.4 allows a malicious webmaster to embed Javascript in a hyperlink that ends in a .jsp extension, which causes an error message that does not properly quote the Javascript. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 2

24 May 2001 — Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request. • https://www.exploit-db.com/exploits/20722 •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 2

04 Apr 2001 — Directory traversal vulnerability in Caucho Resin 1.2.2 allows remote attackers to read arbitrary files via a "\.." (dot dot) in a URL request. • https://www.exploit-db.com/exploits/20635 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 1

23 Nov 2000 — Caucho Technology Resin 1.2 and possibly earlier allows remote attackers to view JSP source via an HTTP request to a .jsp file with certain characters appended to the file name, such as (1) "..", (2) "%2e. • https://www.exploit-db.com/exploits/20429 •