Page 6 of 27 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 15EXPL: 0

BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /*.shtml/ into the URL, which invokes the SSIServlet. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0410.html http://developer.bea.com/alerts/security_000728.html http://www.osvdb.org/1480 http://www.securityfocus.com/bid/1517 •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 2

The default configuration of BEA WebLogic 5.1.0 allows a remote attacker to view source code of programs by requesting a URL beginning with /file/, which causes the default servlet to display the file without further processing. • https://www.exploit-db.com/exploits/20027 http://marc.info/?l=bugtraq&m=96161462915381&w=2 http://www.securityfocus.com/bid/1378 http://www.weblogic.com/docs51/admindocs/http.html#file https://exchange.xforce.ibmcloud.com/vulnerabilities/4775 •