Page 3 of 26 results (0.009 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

Directory traversal vulnerability in Caucho Resin Professional 3.1.0 and Caucho Resin 3.1.0 and earlier for Windows allows remote attackers to read certain files via a .. (dot dot) in a URI containing a "\web-inf" sequence. Vulnerabilidad de cruce de directorio en Caucho Resin Professional 3.1.0 y Caucho Resin 3.1.0 y anteriores para Windows permite a atacantes remotos leer ciertos ficheros mediante una secuencia .. (punto punto) en un URI que contiene la secuencia "\web-inf". • https://www.exploit-db.com/exploits/30038 http://osvdb.org/36058 http://secunia.com/advisories/25286 http://www.caucho.com/resin-3.1/changes/changes.xtp http://www.rapid7.com/advisories/R7-0029.jsp http://www.securityfocus.com/bid/23985 http://www.securitytracker.com/id?1018061 http://www.vupen.com/english/advisories/2007/1824 https://exchange.xforce.ibmcloud.com/vulnerabilities/34296 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in Caucho Resin 3.0.17 and 3.0.18 for Windows allows remote attackers to read arbitrary files via a "C:%5C" (encoded drive letter) in a URL. • http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0026.html http://secunia.com/advisories/20125 http://securityreason.com/securityalert/904 http://securitytracker.com/id?1016109 http://www.osvdb.org/25570 http://www.rapid7.com/advisories/R7-0024.html http://www.securityfocus.com/archive/1/434150/100/0/threaded http://www.securityfocus.com/bid/18005 http://www.vupen.com/english/advisories/2006/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/26478 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

Directory traversal vulnerability in the viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to read arbitrary files under other web roots via the contextpath parameter. NOTE: this issue can produce resultant path disclosure when the parameter is invalid. • http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0384.html http://secunia.com/advisories/20125 http://securityreason.com/securityalert/908 http://securitytracker.com/id?1016110 http://www.osvdb.org/25571 http://www.securityfocus.com/archive/1/434145 http://www.securityfocus.com/bid/18007 http://www.vupen.com/english/advisories/2006/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/26494 •

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 3

The viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to obtain the source code for file under the web root via the file parameter. • https://www.exploit-db.com/exploits/27888 http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0384.html http://securityreason.com/securityalert/908 http://www.securityfocus.com/archive/1/434145 http://www.securityfocus.com/bid/18007 http://www.vupen.com/english/advisories/2006/1831 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Caucho Technology Resin 2.1.12 allows remote attackers to view JSP source via an HTTP request to a .jsp file that ends in a "%20" (encoded space character), e.g. index.jsp%20. Caucho Technology Resin 2.1.21 permite a atacantes remotos ver la fuente JSP mediante una petición a un fichero .jsp que acaba en un carácter "%20" (espacio codificado en URL), por ejemplo index.jsp%20. • http://marc.info/?l=bugtraq&m=107635084830547&w=2 http://www.securityfocus.com/bid/9614 https://exchange.xforce.ibmcloud.com/vulnerabilities/15085 •