Page 3 of 14 results (0.002 seconds)

CVSS: 5.1EPSS: 1%CPEs: 2EXPL: 1

A cross-site scripting vulnerability in Caucho Technology Resin before 1.2.4 allows a malicious webmaster to embed Javascript in a hyperlink that ends in a .jsp extension, which causes an error message that does not properly quote the Javascript. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html http://www.caucho.com/products/resin/changes.xtp http://www.kb.cert.org/vuls/id/981651 http://www.osvdb.org/1890 http://www.securityfocus.com/bid/2981 https://exchange.xforce.ibmcloud.com/vulnerabilities/6793 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request. • https://www.exploit-db.com/exploits/20722 http://marc.info/?l=bugtraq&m=98633597813833&w=2 http://www.securityfocus.com/bid/2533 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

Directory traversal vulnerability in Caucho Resin 1.2.2 allows remote attackers to read arbitrary files via a "\.." (dot dot) in a URL request. • https://www.exploit-db.com/exploits/20635 http://marc.info/?l=bugtraq&m=98229372610440&w=2 http://www.securityfocus.com/bid/2384 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 1

Caucho Technology Resin 1.2 and possibly earlier allows remote attackers to view JSP source via an HTTP request to a .jsp file with certain characters appended to the file name, such as (1) "..", (2) "%2e. • https://www.exploit-db.com/exploits/20429 http://marc.info/?l=bugtraq&m=97502269408279&w=2 http://www.securityfocus.com/archive/1/146770 http://www.securityfocus.com/bid/1986 https://exchange.xforce.ibmcloud.com/vulnerabilities/5568 •