Page 6 of 28 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request. • https://www.exploit-db.com/exploits/20722 http://marc.info/?l=bugtraq&m=98633597813833&w=2 http://www.securityfocus.com/bid/2533 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

Directory traversal vulnerability in Caucho Resin 1.2.2 allows remote attackers to read arbitrary files via a "\.." (dot dot) in a URL request. • https://www.exploit-db.com/exploits/20635 http://marc.info/?l=bugtraq&m=98229372610440&w=2 http://www.securityfocus.com/bid/2384 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 1

Caucho Technology Resin 1.2 and possibly earlier allows remote attackers to view JSP source via an HTTP request to a .jsp file with certain characters appended to the file name, such as (1) "..", (2) "%2e. • https://www.exploit-db.com/exploits/20429 http://marc.info/?l=bugtraq&m=97502269408279&w=2 http://www.securityfocus.com/archive/1/146770 http://www.securityfocus.com/bid/1986 https://exchange.xforce.ibmcloud.com/vulnerabilities/5568 •