CVE-2025-3355
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-30

Last updated on: 2025-11-07

Assigner: IBM Corporation

Description
IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 21 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-30
Last Modified
2025-11-07
Generated
2026-05-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 22 associated CPEs
Vendor Product Version / Range
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
ibm tivoli_monitoring 6.3.0.7
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart