


Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This backup file can be tricked to inject special elements such as '.' and '/' separators, for attackers to escape outside of the restricted location to access files or directories.
#Cod modtools expecting uv error zip
SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. (dot dot) in the filename, which is not proper.
#Cod modtools expecting uv error archive
(dot dot slash) in a filename in an archive file, related to KNewsstuff downloads.ĭirectory traversal vulnerability in kvarcve.dll in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allows remote attackers to delete arbitrary files via a (1) ZIP, (2) UUE or (3) TAR archive that contains a. Statics/ueditor/php/vendor/ in YUNUCMS 1.1.5 allows arbitrary file deletion via the statics/ueditor/php/controller.php?action=remove key parameter, as demonstrated by using directory traversal to delete the install.lock file.ĭirectory traversal vulnerability in KArchive before 5.24, as used in KDE Frameworks, allows remote attackers to write to arbitrary files via a. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a. The user-controlled file name is not properly sanitized before it is used to create a file system path. This affects the package from 0 and before 1.2.4. /./bin/sh as the parameter.ĭirectory traversal vulnerability in custom.php in Entertainment Media Sharing CMS allows remote attackers to include and execute arbitrary local files via a. Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with.
