CVE-2013-6304
06.03.2014, 11:55
Multiple directory traversal vulnerabilities in Algo Risk Application (ARA) 2.4.0.1 through 4.9.1 in IBM Algo One allow remote authenticated users to bypass intended access restrictions via a crafted pathname for a (1) configuration or (2) JAR file.
| Vendor | Product | Version |
|---|---|---|
| ibm | algo_one | 4.9.1 |
| ibm | algo_risk_application | 2.4.0.1 |
| ibm | algo_risk_application | 2.4.1 |
| ibm | algo_risk_application | 2.4.2 |
| ibm | algo_risk_application | 2.5.0 |
| ibm | algo_risk_application | 2.5.1 |
| ibm | algo_risk_application | 2.5.2 |
| ibm | algo_risk_application | 2.5.3 |
| ibm | algo_risk_application | 2.5.4 |
| ibm | algo_risk_application | 2.5.5 |
| ibm | algo_risk_application | 2.5.5.2 |
| ibm | algo_risk_application | 2.5.6 |
| ibm | algo_risk_application | 2.5.7.1 |
| ibm | algo_risk_application | 2.5.7.2 |
| ibm | algo_risk_application | 2.5.8 |
| ibm | algo_risk_application | 4.5.1 |
| ibm | algo_risk_application | 4.5.2 |
| ibm | algo_risk_application | 4.5.3 |
| ibm | algo_risk_application | 4.5.4 |
| ibm | algo_risk_application | 4.6.0 |
| ibm | algo_risk_application | 4.6.1 |
| ibm | algo_risk_application | 4.7.0 |
| ibm | algo_risk_application | 4.7.1 |
| ibm | algo_risk_application | 4.8.0 |
| ibm | algo_risk_application | 4.9.0 |
| ibm | algo_risk_application | 4.9.1 |
𝑥
= Vulnerable software versions
References