Page 5 of 28 results (0.001 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Caucho Technology Resin server 2.1.1 to 2.1.2 allows remote attackers to obtain server's root path via requests for MS-DOS device names such as lpt9.xtp. • http://seclists.org/bugtraq/2002/Jul/0186.html http://www.securityfocus.com/bid/5252 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in view_source.jsp in Resin 2.1.2 allows remote attackers to read arbitrary files via a "\.." (backslash dot dot). • http://online.securityfocus.com/archive/1/277225 http://www.iss.net/security_center/static/9351.php http://www.securityfocus.com/bid/5031 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Resin 2.1.1 allows remote attackers to cause a denial of service (thread and connection consumption) via multiple URL requests containing the DOS 'CON' device name and a registered file extension such as .jsp or .xtp. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0108.html •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Resin 2.1.1 allows remote attackers to cause a denial of service (memory consumption and hang) via a URL with long variables for non-existent resources. • http://online.securityfocus.com/archive/1/277232 http://www.iss.net/security_center/static/9352.php http://www.securityfocus.com/bid/5032 •

CVSS: 5.1EPSS: 1%CPEs: 2EXPL: 1

A cross-site scripting vulnerability in Caucho Technology Resin before 1.2.4 allows a malicious webmaster to embed Javascript in a hyperlink that ends in a .jsp extension, which causes an error message that does not properly quote the Javascript. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html http://www.caucho.com/products/resin/changes.xtp http://www.kb.cert.org/vuls/id/981651 http://www.osvdb.org/1890 http://www.securityfocus.com/bid/2981 https://exchange.xforce.ibmcloud.com/vulnerabilities/6793 •