CVE-2013-622513.01.2020, 14:15LiveZilla 5.0.1.4 has a Remote Code Execution vulnerabilityPath TraversalEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST9.8 CRITICALNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HmitreCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 97%VendorProductVersionlivezillalivezilla5.0.1.4𝑥= Vulnerable software versionsKnown Exploits!http://www.exploit-db.com/exploits/29672http://www.exploit-db.com/exploits/29672Common Weakness EnumerationCWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Referenceshttp://www.exploit-db.com/exploits/29672https://curesec.com/de/veroeffentlichungen/advisories.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/89051http://www.exploit-db.com/exploits/29672https://curesec.com/de/veroeffentlichungen/advisories.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/89051