Directory traversal vulnerability in opm/read_sessionlog.php in Xceedium Xsuite 2.4.4.5 and earlier allows remote attackers to read arbitrary files via a …// (quadruple dot double slash) in the logFile parameter.
packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html
www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt
support.ca.com/us/product-content/recommended-reading/security-notices/ca20180614-01--security-notice-for-ca-privileged-access-manager.html
www.exploit-db.com/exploits/37708/