Page 16 of 155 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

13 Oct 2000 — BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /*.shtml/ into the URL, which invokes the SSIServlet. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0410.html •

CVSS: 10.0EPSS: 5%CPEs: 3EXPL: 2

13 Oct 2000 — BEA WebLogic 5.1.x does not properly restrict access to the PageCompileServlet, which could allow remote attackers to compile and execute Java JHTML code by directly invoking the servlet on any source file. • https://www.exploit-db.com/exploits/20125 •

CVSS: 10.0EPSS: 5%CPEs: 3EXPL: 2

13 Oct 2000 — BEA WebLogic 5.1.x does not properly restrict access to the JSPServlet, which could allow remote attackers to compile and execute Java JSP code by directly invoking the servlet on any source file. • https://www.exploit-db.com/exploits/20081 •

CVSS: 7.5EPSS: 5%CPEs: 8EXPL: 2

21 Jun 2000 — The default configuration of BEA WebLogic 5.1.0 allows a remote attacker to view source code of programs by requesting a URL beginning with /file/, which causes the default servlet to display the file without further processing. • https://www.exploit-db.com/exploits/20027 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 1

08 Jun 2000 — The default configuration of BEA WebLogic 3.1.8 through 4.5.1 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0262.htm • CWE-178: Improper Handling of Case Sensitivity •