CVE-2014-6222
07.06.2015, 18:59
Directory traversal vulnerability in IBM Marketing Operations 7.x and 8.x before 8.5.0.7.2, 8.6.x before 8.6.0.8, 9.0.x before 9.0.0.4.1, 9.1.0.x before 9.1.0.5, and 9.1.1.x before 9.1.1.2 allows remote authenticated users to read arbitrary files via a .. (dot dot) in a URL.
Vendor | Product | Version |
---|---|---|
ibm | marketing_operations | 7.2.0.0 |
ibm | marketing_operations | 7.2.0.4 |
ibm | marketing_operations | 7.2.1.0 |
ibm | marketing_operations | 7.2.1.12 |
ibm | marketing_operations | 7.3.2.0 |
ibm | marketing_operations | 7.3.2.1 |
ibm | marketing_operations | 7.3.2.8 |
ibm | marketing_operations | 7.4.0.0 |
ibm | marketing_operations | 7.4.0.2 |
ibm | marketing_operations | 7.4.1.0 |
ibm | marketing_operations | 7.4.1.6 |
ibm | marketing_operations | 7.4.2.0 |
ibm | marketing_operations | 7.4.2.7 |
ibm | marketing_operations | 7.5.0.0 |
ibm | marketing_operations | 7.5.0.1 |
ibm | marketing_operations | 7.5.2.0 |
ibm | marketing_operations | 7.5.2.3 |
ibm | marketing_operations | 7.5.3.0 |
ibm | marketing_operations | 7.5.3.7 |
ibm | marketing_operations | 7.5.3.8 |
ibm | marketing_operations | 7.5.3.9 |
ibm | marketing_operations | 8.0.0.0 |
ibm | marketing_operations | 8.0.0.2 |
ibm | marketing_operations | 8.1.0.0 |
ibm | marketing_operations | 8.1.0.6 |
ibm | marketing_operations | 8.1.0.7 |
ibm | marketing_operations | 8.1.1.0 |
ibm | marketing_operations | 8.1.1.4 |
ibm | marketing_operations | 8.2.0.0 |
ibm | marketing_operations | 8.2.0.5 |
ibm | marketing_operations | 8.2.0.6 |
ibm | marketing_operations | 8.2.0.7 |
ibm | marketing_operations | 8.2.0.8 |
ibm | marketing_operations | 8.2.0.9 |
ibm | marketing_operations | 8.2.0.10 |
ibm | marketing_operations | 8.2.0.11 |
ibm | marketing_operations | 8.2.0.12 |
ibm | marketing_operations | 8.2.0.13 |
ibm | marketing_operations | 8.5.0.0 |
ibm | marketing_operations | 8.5.0.1 |
ibm | marketing_operations | 8.5.0.2 |
ibm | marketing_operations | 8.5.0.3 |
ibm | marketing_operations | 8.5.0.4 |
ibm | marketing_operations | 8.5.0.5 |
ibm | marketing_operations | 8.5.0.6 |
ibm | marketing_operations | 8.5.0.7 |
ibm | marketing_operations | 8.6.0.0 |
ibm | marketing_operations | 8.6.0.2 |
ibm | marketing_operations | 8.6.0.3 |
ibm | marketing_operations | 8.6.0.4 |
ibm | marketing_operations | 8.6.0.5 |
ibm | marketing_operations | 8.6.0.6 |
ibm | marketing_operations | 8.6.0.7 |
ibm | marketing_operations | 9.0.0.0 |
ibm | marketing_operations | 9.0.0.1 |
ibm | marketing_operations | 9.0.0.2 |
ibm | marketing_operations | 9.0.0.3 |
ibm | marketing_operations | 9.0.0.4 |
ibm | marketing_operations | 9.1.0.0 |
ibm | marketing_operations | 9.1.0.2 |
ibm | marketing_operations | 9.1.0.3 |
ibm | marketing_operations | 9.1.0.4 |
ibm | marketing_operations | 9.1.1.0 |
ibm | marketing_operations | 9.1.1.1 |
𝑥
= Vulnerable software versions
References