[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-14143":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":45,"name":46,"published":47,"updated":34},14143,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":34,"public_description":35,"public_recommendation":36,"recommendation":34,"references":37,"cvssv3":34,"epss_score":40,"epss_percentile":41,"cve":42,"in_cisa_catalog":44,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"By requesting a non-existent .JSP file, or by invoking the JSPServlet directly and supplying no filename, it is possible to make the ServletExec ISAPI filter disclose the physical path of the webroot.","Use the main ServletExec Admin UI to set a global error page for the entire ServletExec Virtual Server.",[38,39],"http://www.westpoint.ltd.uk/advisories/wp-02-0006.txt","http://www.securityfocus.com/bid/4793",0.05767,0.90449,[43],"CVE-2002-0892",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.10960","ServletExec 4.1 ISAPI Physical Path Disclosure","2018-01-02T00:00:00Z"]