CVE-2013-6304
06.03.2014, 11:55
Multiple directory traversal vulnerabilities in Algo Risk Application (ARA) 2.4.0.1 through 4.9.1 in IBM Algo One allow remote authenticated users to bypass intended access restrictions via a crafted pathname for a (1) configuration or (2) JAR file.
Vendor | Product | Version |
---|---|---|
ibm | algo_one | 4.9.1 |
ibm | algo_risk_application | 2.4.0.1 |
ibm | algo_risk_application | 2.4.1 |
ibm | algo_risk_application | 2.4.2 |
ibm | algo_risk_application | 2.5.0 |
ibm | algo_risk_application | 2.5.1 |
ibm | algo_risk_application | 2.5.2 |
ibm | algo_risk_application | 2.5.3 |
ibm | algo_risk_application | 2.5.4 |
ibm | algo_risk_application | 2.5.5 |
ibm | algo_risk_application | 2.5.5.2 |
ibm | algo_risk_application | 2.5.6 |
ibm | algo_risk_application | 2.5.7.1 |
ibm | algo_risk_application | 2.5.7.2 |
ibm | algo_risk_application | 2.5.8 |
ibm | algo_risk_application | 4.5.1 |
ibm | algo_risk_application | 4.5.2 |
ibm | algo_risk_application | 4.5.3 |
ibm | algo_risk_application | 4.5.4 |
ibm | algo_risk_application | 4.6.0 |
ibm | algo_risk_application | 4.6.1 |
ibm | algo_risk_application | 4.7.0 |
ibm | algo_risk_application | 4.7.1 |
ibm | algo_risk_application | 4.8.0 |
ibm | algo_risk_application | 4.9.0 |
ibm | algo_risk_application | 4.9.1 |
𝑥
= Vulnerable software versions
References