cpe:/h:ibm:advanced_management_module:1.00 cpe:/h:ibm:advanced_management_module:1.01 cpe:/h:ibm:advanced_management_module:1.20 cpe:/h:ibm:advanced_management_module:1.20:f cpe:/h:ibm:advanced_management_module:1.25 cpe:/h:ibm:advanced_management_module:1.25:e cpe:/h:ibm:advanced_management_module:1.25:i cpe:/h:ibm:advanced_management_module:1.26:b cpe:/h:ibm:advanced_management_module:1.26:e cpe:/h:ibm:advanced_management_module:1.26:h cpe:/h:ibm:advanced_management_module:1.26:i cpe:/h:ibm:advanced_management_module:1.26:k cpe:/h:ibm:advanced_management_module:1.28:g cpe:/h:ibm:advanced_management_module:1.32:d cpe:/h:ibm:advanced_management_module:1.34:b cpe:/h:ibm:advanced_management_module:1.34:e cpe:/h:ibm:advanced_management_module:1.36:d cpe:/h:ibm:advanced_management_module:1.36:g cpe:/h:ibm:advanced_management_module:1.36:h cpe:/h:ibm:advanced_management_module:1.36:k cpe:/h:ibm:advanced_management_module:1.42:d cpe:/h:ibm:advanced_management_module:1.42:f cpe:/h:ibm:advanced_management_module:1.42:i cpe:/h:ibm:advanced_management_module:1.42:n cpe:/h:ibm:advanced_management_module:1.42:o cpe:/h:ibm:advanced_management_module:1.42:t cpe:/h:ibm:advanced_management_module:2.46:c cpe:/h:ibm:advanced_management_module:2.46:j cpe:/h:ibm:advanced_management_module:2.48:c cpe:/h:ibm:advanced_management_module:2.48:d cpe:/h:ibm:advanced_management_module:2.48:g cpe:/h:ibm:advanced_management_module:2.48:l cpe:/h:ibm:advanced_management_module:2.48:n cpe:/h:ibm:advanced_management_module:2.50:c cpe:/h:ibm:advanced_management_module:2.50:g cpe:/h:ibm:advanced_management_module:2.50:k cpe:/h:ibm:advanced_management_module:2.50:p CVE-2010-2655 2010-07-08T08:54:47.177-04:00 2010-07-20T01:48:00.967-04:00 4.0 NETWORK LOW SINGLE_INSTANCE PARTIAL NONE NONE http://nvd.nist.gov 2010-07-08T11:07:00.000-04:00 EXPLOIT-DB 14237 BID 41383 OSVDB 66124 MISC http://dsecrg.com/pages/vul/show.php?id=154 Directory traversal vulnerability in private/file_management.php on the IBM BladeCenter with Advanced Management Module (AMM) firmware build ID BPET48L, and possibly other versions before 4.7 and 5.0, allows remote authenticated users to list arbitrary directories and possibly have unspecified other impact via a .. (dot dot) in the DIR parameter.