CVE-2002-1989
https://notcve.org/view.php?id=CVE-2002-1989
Resin 2.1.1 allows remote attackers to cause a denial of service (thread and connection consumption) via multiple URL requests containing the DOS 'CON' device name and a registered file extension such as .jsp or .xtp. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0108.html •
CVE-2002-1988
https://notcve.org/view.php?id=CVE-2002-1988
Resin 2.1.1 allows remote attackers to cause a denial of service (memory consumption and hang) via a URL with long variables for non-existent resources. • http://online.securityfocus.com/archive/1/277232 http://www.iss.net/security_center/static/9352.php http://www.securityfocus.com/bid/5032 •
CVE-2001-0828
https://notcve.org/view.php?id=CVE-2001-0828
A cross-site scripting vulnerability in Caucho Technology Resin before 1.2.4 allows a malicious webmaster to embed Javascript in a hyperlink that ends in a .jsp extension, which causes an error message that does not properly quote the Javascript. • http://archive.cert.uni-stuttgart.de/archive/bugtraq/2001/07/msg00021.html http://www.caucho.com/products/resin/changes.xtp http://www.kb.cert.org/vuls/id/981651 http://www.osvdb.org/1890 http://www.securityfocus.com/bid/2981 https://exchange.xforce.ibmcloud.com/vulnerabilities/6793 •
CVE-2001-0399 – Caucho Technology Resin 1.2/1.3 - JavaBean Disclosure
https://notcve.org/view.php?id=CVE-2001-0399
Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request. • https://www.exploit-db.com/exploits/20722 http://marc.info/?l=bugtraq&m=98633597813833&w=2 http://www.securityfocus.com/bid/2533 •
CVE-2001-0304 – caucho Technology resin 1.2 - Directory Traversal
https://notcve.org/view.php?id=CVE-2001-0304
Directory traversal vulnerability in Caucho Resin 1.2.2 allows remote attackers to read arbitrary files via a "\.." (dot dot) in a URL request. • https://www.exploit-db.com/exploits/20635 http://marc.info/?l=bugtraq&m=98229372610440&w=2 http://www.securityfocus.com/bid/2384 •