Directory traversal vulnerability in the TFTP Server 1.0.0.24 in Ipswitch WhatsUp Gold allows remote attackers to read arbitrary files via a .. (dot dot) in the Filename field of an RRQ operation.
References
Configurations
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://secpod.org/blog/?p=424 - Exploit | |
References | () http://secunia.com/advisories/47025 - | |
References | () http://securitytracker.com/id?1026368 - | |
References | () http://www.exploit-db.com/exploits/18189/ - Exploit | |
References | () http://www.osvdb.org/77455 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/71610 - | |
References | () https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05054714 - |
Information
Published : 2014-12-28 02:59
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4722
Mitre link : CVE-2011-4722
CVE.ORG link : CVE-2011-4722
JSON object : View
Products Affected
ipswitch
- tftp_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')