Directory traversal vulnerability in Apache Wicket 1.4.x prior to 1.4.20 and 1.5.x prior to 1.5.5 allows remote malicious users to read arbitrary web-application files via a relative pathname in a URL for a Wicket resource that corresponds to a null package.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache wicket 1.4.3 |
||
apache wicket 1.4.4 |
||
apache wicket 1.4.11 |
||
apache wicket 1.4.12 |
||
apache wicket 1.4.5 |
||
apache wicket 1.4.6 |
||
apache wicket 1.4.13 |
||
apache wicket 1.4.14 |
||
apache wicket 1.4.1 |
||
apache wicket 1.4.2 |
||
apache wicket 1.4.9 |
||
apache wicket 1.4.10 |
||
apache wicket 1.4.18 |
||
apache wicket 1.4.19 |
||
apache wicket 1.4.0 |
||
apache wicket 1.4.7 |
||
apache wicket 1.4.8 |
||
apache wicket 1.4.15 |
||
apache wicket 1.4.16 |
||
apache wicket 1.4.17 |
||
apache wicket 1.5.0 |
||
apache wicket 1.5.1 |
||
apache wicket 1.5.2 |
||
apache wicket 1.5.3 |
||
apache wicket 1.5.4 |