7.5 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.25 Low
EPSS
Percentile
96.7%
Directory traversal vulnerability in caloggerd in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allows remote attackers to append arbitrary data to arbitrary files via directory traversal sequences in unspecified input fields, which are used in log messages. NOTE: this can be leveraged for code execution in many installation environments by writing to a startup file or configuration file.
secunia.com/advisories/30300
www.securityfocus.com/archive/1/492266/100/0/threaded
www.securityfocus.com/archive/1/492274/100/0/threaded
www.securityfocus.com/bid/29283
www.securitytracker.com/id?1020043
www.vupen.com/english/advisories/2008/1573/references
www.zerodayinitiative.com/advisories/ZDI-08-027/
exchange.xforce.ibmcloud.com/vulnerabilities/42524
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=176798