Page 3 of 17 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in view_source.jsp in Resin 2.1.2 allows remote attackers to read arbitrary files via a "\.." (backslash dot dot). • http://online.securityfocus.com/archive/1/277225 http://www.iss.net/security_center/static/9351.php http://www.securityfocus.com/bid/5031 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Resin 2.1.1 allows remote attackers to cause a denial of service (thread and connection consumption) via multiple URL requests containing the DOS 'CON' device name and a registered file extension such as .jsp or .xtp. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0108.html •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Resin 2.1.1 allows remote attackers to cause a denial of service (memory consumption and hang) via a URL with long variables for non-existent resources. • http://online.securityfocus.com/archive/1/277232 http://www.iss.net/security_center/static/9352.php http://www.securityfocus.com/bid/5032 •

CVSS: 5.1EPSS: 1%CPEs: 2EXPL: 1

A cross-site scripting vulnerability in Caucho Technology Resin before 1.2.4 allows a malicious webmaster to embed Javascript in a hyperlink that ends in a .jsp extension, which causes an error message that does not properly quote the Javascript. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html http://www.caucho.com/products/resin/changes.xtp http://www.kb.cert.org/vuls/id/981651 http://www.osvdb.org/1890 http://www.securityfocus.com/bid/2981 https://exchange.xforce.ibmcloud.com/vulnerabilities/6793 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request. • https://www.exploit-db.com/exploits/20722 http://marc.info/?l=bugtraq&m=98633597813833&w=2 http://www.securityfocus.com/bid/2533 •