Vulnerabilities > Caucho Technology
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2002-12-31 | CVE-2002-1989 | Denial-Of-Service vulnerability in Caucho Technology Resin 2.1.1 Resin 2.1.1 allows remote attackers to cause a denial of service (thread and connection consumption) via multiple URL requests containing the DOS 'CON' device name and a registered file extension such as .jsp or .xtp. | 5.0 |
2002-12-31 | CVE-2002-1988 | Denial Of Service vulnerability in Caucho Technology Resin 2.1.1 Resin 2.1.1 allows remote attackers to cause a denial of service (memory consumption and hang) via a URL with long variables for non-existent resources. | 5.0 |
2002-12-31 | CVE-2002-1987 | Unspecified vulnerability in Caucho Technology Resin 2.1.2 Directory traversal vulnerability in view_source.jsp in Resin 2.1.2 allows remote attackers to read arbitrary files via a "\.." (backslash dot dot). | 5.0 |
2001-12-06 | CVE-2001-0828 | Cross-Site Scripting vulnerability in Caucho Technology Resin 1.2.2 A cross-site scripting vulnerability in Caucho Technology Resin before 1.2.4 allows a malicious webmaster to embed Javascript in a hyperlink that ends in a .jsp extension, which causes an error message that does not properly quote the Javascript. | 5.1 |
2001-06-18 | CVE-2001-0399 | Unspecified vulnerability in Caucho Technology Resin 1.2/1.3 Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request. | 5.0 |
2001-05-03 | CVE-2001-0304 | Directory Traversal vulnerability in Caucho Technology Resin 1.2.2 Directory traversal vulnerability in Caucho Resin 1.2.2 allows remote attackers to read arbitrary files via a "\.." (dot dot) in a URL request. | 5.0 |
2000-11-23 | CVE-2000-1224 | Unspecified vulnerability in Caucho Technology Resin 1.1.5/1.2 Caucho Technology Resin 1.2 and possibly earlier allows remote attackers to view JSP source via an HTTP request to a .jsp file with certain characters appended to the file name, such as (1) "..", (2) "%2e..", (3) "%81", (4) "%82", and others. | 5.0 |