Page 3 of 25 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in Caucho Resin 3.0.17 and 3.0.18 for Windows allows remote attackers to read arbitrary files via a "C:%5C" (encoded drive letter) in a URL. • http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0026.html http://secunia.com/advisories/20125 http://securityreason.com/securityalert/904 http://securitytracker.com/id?1016109 http://www.osvdb.org/25570 http://www.rapid7.com/advisories/R7-0024.html http://www.securityfocus.com/archive/1/434150/100/0/threaded http://www.securityfocus.com/bid/18005 http://www.vupen.com/english/advisories/2006/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/26478 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

Directory traversal vulnerability in the viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to read arbitrary files under other web roots via the contextpath parameter. NOTE: this issue can produce resultant path disclosure when the parameter is invalid. • http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0384.html http://secunia.com/advisories/20125 http://securityreason.com/securityalert/908 http://securitytracker.com/id?1016110 http://www.osvdb.org/25571 http://www.securityfocus.com/archive/1/434145 http://www.securityfocus.com/bid/18007 http://www.vupen.com/english/advisories/2006/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/26494 •

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 3

The viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to obtain the source code for file under the web root via the file parameter. • https://www.exploit-db.com/exploits/27888 http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0384.html http://securityreason.com/securityalert/908 http://www.securityfocus.com/archive/1/434145 http://www.securityfocus.com/bid/18007 http://www.vupen.com/english/advisories/2006/1831 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Caucho Technology Resin 2.1.12 allows remote attackers to view JSP source via an HTTP request to a .jsp file that ends in a "%20" (encoded space character), e.g. index.jsp%20. Caucho Technology Resin 2.1.21 permite a atacantes remotos ver la fuente JSP mediante una petición a un fichero .jsp que acaba en un carácter "%20" (espacio codificado en URL), por ejemplo index.jsp%20. • http://marc.info/?l=bugtraq&m=107635084830547&w=2 http://www.securityfocus.com/bid/9614 https://exchange.xforce.ibmcloud.com/vulnerabilities/15085 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Caucho Technology Resin 2.1.12 allows remote attackers to gain sensitive information and view the contents of the /WEB-INF/ directory via an HTTP request for "WEB-INF..", which is equivalent to "WEB-INF" in Windows. Caucho Technology Resin 2.1.12 permite a atacantes remotos obtener información sensible y ver los contenidos del directorio /WEB-INF/ mediante una petición HTTP de "WEB-INF • https://www.exploit-db.com/exploits/23671 http://marc.info/?l=bugtraq&m=107635084830547&w=2 http://www.securityfocus.com/bid/9617 https://exchange.xforce.ibmcloud.com/vulnerabilities/15087 •