Directory traversal vulnerability in Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, allows remote authenticated users to read and delete arbitrary files via “…” sequences in the eSCCAdHocHtmlFile parameter to eSMPAuditServlet, which is not properly handled by the getadhochtml function.
secunia.com/advisories/22023
securitytracker.com/id?1016910
users.tpg.com.au/adsl2dvp/advisories/200608-computerassociates.txt
www.osvdb.org/29010
www.securityfocus.com/archive/1/446611/100/0/threaded
www.securityfocus.com/archive/1/446716/100/0/threaded
www.securityfocus.com/bid/20139
www.vupen.com/english/advisories/2006/3738
www3.ca.com/securityadvisor/blogs/posting.aspx?id=90744&pid=93243&date=2006/9
www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34617
exchange.xforce.ibmcloud.com/vulnerabilities/29104