Metrics
Affected Vendors & Products
Mon, 12 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 11 May 2025 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Seeyon Zhiyuan OA Web Application System 8.1 SP2. It has been classified as problematic. Affected is the function Download of the file seeyon\opt\Seeyon\A8\ApacheJetspeed\webapps\seeyon\WEB-INF\lib\seeyon-apps-m3.jar!\com\seeyon\apps\m3\core\controller\M3CoreController.class of the component ZIP File Handler. The manipulation of the argument Name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
Title | Seeyon Zhiyuan OA Web Application System ZIP File M3CoreController.class download path traversal | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-05-11T04:00:08.206Z
Updated: 2025-05-12T14:00:29.397Z
Reserved: 2025-05-10T05:33:56.295Z
Link: CVE-2025-4529

Updated: 2025-05-12T14:00:19.901Z

Status : Awaiting Analysis
Published: 2025-05-11T04:15:17.933
Modified: 2025-05-12T17:32:32.760
Link: CVE-2025-4529

No data.