Page 21 of 103 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 3

IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string. • https://www.exploit-db.com/exploits/20097 http://archives.neohapsis.com/archives/bugtraq/2000-07/0342.html http://www.securityfocus.com/bid/1500 https://exchange.xforce.ibmcloud.com/vulnerabilities/5012 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

IBM WebSphere server 3.0.2 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0263.html http://www-4.ibm.com/software/webservers/appserv/efix.html http://www.securityfocus.com/bid/1328 • CWE-178: Improper Handling of Case Sensitivity •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

IBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its data files stored in /usr/bin. • http://www.securityfocus.com/bid/844 •