{ "schema_version": "1.4.0", "id": "GHSA-g2rg-wccx-q8f2", "modified": "2025-04-11T03:46:09Z", "published": "2022-05-17T01:59:37Z", "aliases": [ "CVE-2011-1715" ], "details": "Directory traversal vulnerability in framework/source/resource/qx/test/part/delay.php in QooxDoo 1.3 and possibly other versions, as used in eyeOS 2.2 and 2.3, and possibly other products allows remote attackers to read arbitrary files via ..%2f (encoded dot dot) sequences in the file parameter.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1715" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66574" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66575" }, { "type": "WEB", "url": "http://blog.eyeos.org/en/2011/04/07/about-some-eyeos-security-issues" }, { "type": "WEB", "url": "http://osvdb.org/71719" }, { "type": "WEB", "url": "http://osvdb.org/71721" }, { "type": "WEB", "url": "http://secunia.com/advisories/43818" }, { "type": "WEB", "url": "http://secunia.com/advisories/43997" }, { "type": "WEB", "url": "http://www.autosectools.com/Advisories/eyeOS.2.3_Local.File.Inclusion_173.html" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/17127" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/47184" } ], "database_specific": { "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-04-18T18:55:00Z" } }