Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.gov.il/en/departments/faq/cve_advisories |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: INCD
Published:
Updated: 2024-08-04T01:01:59.243Z
Reserved: 2021-07-12T00:00:00
Link: CVE-2021-36717

No data.

Status : Modified
Published: 2021-09-07T12:15:07.620
Modified: 2024-11-21T06:13:58.143
Link: CVE-2021-36717

No data.