Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-6304

Опубликовано: 06 мар. 2014
Источник: nvd
CVSS2: 4
EPSS Низкий

Описание

Multiple directory traversal vulnerabilities in Algo Risk Application (ARA) 2.4.0.1 through 4.9.1 in IBM Algo One allow remote authenticated users to bypass intended access restrictions via a crafted pathname for a (1) configuration or (2) JAR file.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:ibm:algo_one:4.9.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.7.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.7.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.8.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.9.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:algo_risk_application:4.9.1:*:*:*:*:*:*:*

EPSS

Процентиль: 69%
0.00611
Низкий

4 Medium

CVSS2

Дефекты

CWE-22

Связанные уязвимости

github
больше 3 лет назад

Multiple directory traversal vulnerabilities in Algo Risk Application (ARA) 2.4.0.1 through 4.9.1 in IBM Algo One allow remote authenticated users to bypass intended access restrictions via a crafted pathname for a (1) configuration or (2) JAR file.

EPSS

Процентиль: 69%
0.00611
Низкий

4 Medium

CVSS2

Дефекты

CWE-22