{"id":"CVE-2016-3972","details":"Directory traversal vulnerability in the dotTailLogServlet in dotCMS before 3.5.1 allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the fileName parameter.","modified":"2026-04-10T03:51:11.652439Z","published":"2016-04-18T15:59:04.143Z","references":[{"type":"ADVISORY","url":"http://dotcms.com/security/SI-34"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2016/Apr/36"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dotcms/core","events":[{"introduced":"0"},{"last_affected":"4f2d1eede4cbce97b93ccc5d35f5aadea5897dd2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.5"}]}}],"versions":["3.0","pre3.5buildrevert"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3972.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}]}