com.caucho:resin@3.0.9 vulnerabilities

  • latest version

    4.0.66

  • first published

    20 years ago

  • latest version published

    3 years ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the com.caucho:resin package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improperly Controlled Modification of Dynamically-Determined Object Attributes

    Affected versions of this package are vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes via the SERVER superglobal array. An attacker can overwrite entries in this array by sending crafted POST parameters.

    How to fix Improperly Controlled Modification of Dynamically-Determined Object Attributes?

    Upgrade com.caucho:resin to version 4.0.29 or higher.

    [,4.0.29)
    • M
    Incorrect Comparison

    Affected versions of this package are vulnerable to Incorrect Comparison due to the improper implementation of the == operator for comparisons. An attacker can exploit this flaw to manipulate or bypass security checks by crafting specific input that leads to unintended behavior.

    How to fix Incorrect Comparison?

    Upgrade com.caucho:resin to version 4.0.29 or higher.

    [,4.0.29)
    • C
    Improper Input Validation

    Affected versions of this package are vulnerable to Improper Input Validation due to improper handling of unspecified characters in variable names. An attacker can exploit this vulnerability to manipulate or contaminate HTTP parameters by sending crafted requests with malicious variable names.

    How to fix Improper Input Validation?

    Upgrade com.caucho:resin to version 4.0.29 or higher.

    [,4.0.29)