CVE-2006-1953
https://notcve.org/view.php?id=CVE-2006-1953
Directory traversal vulnerability in Caucho Resin 3.0.17 and 3.0.18 for Windows allows remote attackers to read arbitrary files via a "C:%5C" (encoded drive letter) in a URL. • http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0026.html http://secunia.com/advisories/20125 http://securityreason.com/securityalert/904 http://securitytracker.com/id?1016109 http://www.osvdb.org/25570 http://www.rapid7.com/advisories/R7-0024.html http://www.securityfocus.com/archive/1/434150/100/0/threaded http://www.securityfocus.com/bid/18005 http://www.vupen.com/english/advisories/2006/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/26478 •
CVE-2006-2438
https://notcve.org/view.php?id=CVE-2006-2438
Directory traversal vulnerability in the viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to read arbitrary files under other web roots via the contextpath parameter. NOTE: this issue can produce resultant path disclosure when the parameter is invalid. • http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0384.html http://secunia.com/advisories/20125 http://securityreason.com/securityalert/908 http://securitytracker.com/id?1016110 http://www.osvdb.org/25571 http://www.securityfocus.com/archive/1/434145 http://www.securityfocus.com/bid/18007 http://www.vupen.com/english/advisories/2006/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/26494 •
CVE-2006-2437 – Caucho Resin 3.0.17/3.0.18 - Viewfile Information Disclosure
https://notcve.org/view.php?id=CVE-2006-2437
The viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to obtain the source code for file under the web root via the file parameter. • https://www.exploit-db.com/exploits/27888 http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0384.html http://securityreason.com/securityalert/908 http://www.securityfocus.com/archive/1/434145 http://www.securityfocus.com/bid/18007 http://www.vupen.com/english/advisories/2006/1831 •