First published: Thu Mar 06 2014(Updated: )
Multiple directory traversal vulnerabilities in Algo Risk Application (ARA) 2.4.0.1 through 4.9.1 in IBM Algo One allow remote authenticated users to bypass intended access restrictions via a crafted pathname for a (1) configuration or (2) JAR file.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Algo One | =4.9.1 | |
Ibm Algo Risk Application | =2.4.0.1 | |
Ibm Algo Risk Application | =2.4.1 | |
Ibm Algo Risk Application | =2.4.2 | |
Ibm Algo Risk Application | =2.5.0 | |
Ibm Algo Risk Application | =2.5.1 | |
Ibm Algo Risk Application | =2.5.2 | |
Ibm Algo Risk Application | =2.5.3 | |
Ibm Algo Risk Application | =2.5.4 | |
Ibm Algo Risk Application | =2.5.5 | |
Ibm Algo Risk Application | =2.5.5.2 | |
Ibm Algo Risk Application | =2.5.6 | |
Ibm Algo Risk Application | =2.5.7.1 | |
Ibm Algo Risk Application | =2.5.7.2 | |
Ibm Algo Risk Application | =2.5.8 | |
Ibm Algo Risk Application | =4.5.1 | |
Ibm Algo Risk Application | =4.5.2 | |
Ibm Algo Risk Application | =4.5.3 | |
Ibm Algo Risk Application | =4.5.4 | |
Ibm Algo Risk Application | =4.6.0 | |
Ibm Algo Risk Application | =4.6.1 | |
Ibm Algo Risk Application | =4.7.0 | |
Ibm Algo Risk Application | =4.7.1 | |
Ibm Algo Risk Application | =4.8.0 | |
Ibm Algo Risk Application | =4.9.0 | |
Ibm Algo Risk Application | =4.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.