[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-13799":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":44,"name":45,"published":46,"updated":34},13799,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":34,"public_description":35,"public_recommendation":36,"recommendation":34,"references":37,"cvssv3":34,"epss_score":39,"epss_percentile":40,"cve":41,"in_cisa_catalog":43,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"The FSP Suite (daemon) has been found to improperly filter out paths with trailing / or starting with /. This would allow an attacker access to files that reside outside the bounding FSP root directory.","No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.",[38],"http://www.securityfocus.com/bid/9377",0.01267,0.79433,[42],"CVE-2003-1022",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.11988","FSP Suite Directory Traversal Vulnerability","2018-01-02T00:00:00Z"]