Directory traversal vulnerability in FileZen V3.0.0 to V4.2.1 allows remote attackers to upload an arbitrary file in the specific directory in FileZen via unspecified vectors.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN95355683/index.html | Third Party Advisory |
https://www.soliton.co.jp/support/2018/003328.html | Patch Vendor Advisory |
http://jvn.jp/en/jp/JVN95355683/index.html | Third Party Advisory |
https://www.soliton.co.jp/support/2018/003328.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN95355683/index.html - Third Party Advisory | |
References | () https://www.soliton.co.jp/support/2018/003328.html - Patch, Vendor Advisory |
Information
Published : 2018-11-15 15:29
Updated : 2024-11-21 03:38
NVD link : CVE-2018-0693
Mitre link : CVE-2018-0693
CVE.ORG link : CVE-2018-0693
JSON object : View
Products Affected
soliton
- filezen
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')