{"id":"CVE-2016-10037","details":"Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted id (aka dir) parameter, related to browser/directory/getlist.","modified":"2026-04-11T19:42:00.993109Z","published":"2016-12-24T11:59:00.147Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95127"},{"type":"ADVISORY","url":"https://raw.githubusercontent.com/modxcms/revolution/v2.5.2-pl/core/docs/changelog.txt"},{"type":"FIX","url":"https://github.com/modxcms/revolution/pull/13177"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/modxcms/revolution","events":[{"introduced":"0"},{"fixed":"a41de649e9d4884a9ac777d29474234eebd56586"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"2.5.2"}],"cpe":"cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*"}}],"versions":["v2.0.1-pl","v2.0.3-pl","v2.0.4-pl","v2.0.4-pl2","v2.0.5-pl","v2.0.6-pl","v2.0.7-pl","v2.0.8-pl","v2.1.0-pl","v2.1.0-rc1","v2.1.0-rc2","v2.1.0-rc3","v2.1.0-rc4","v2.1.1-pl","v2.1.2-pl","v2.1.3-pl","v2.1.4-pl","v2.1.5-pl","v2.2.0-pl","v2.2.0-pl2","v2.2.0-rc1","v2.2.0-rc2","v2.2.0-rc3","v2.2.1-pl","v2.2.10-pl","v2.2.11-pl","v2.2.12-pl","v2.2.13-pl","v2.2.14-pl","v2.2.15-pl","v2.2.2-pl","v2.2.3-pl","v2.2.4-pl","v2.2.5-pl","v2.2.6-pl","v2.2.7-pl","v2.2.8-pl","v2.2.9-pl","v2.3.0-pl","v2.3.1-pl","v2.3.2-pl","v2.3.3-pl","v2.3.4-pl","v2.3.5-pl","v2.3.6-pl","v2.4.1-pl","v2.4.2-pl","v2.5.0-pl","v2.5.0-rc1","v2.5.0-rc2","v2.5.1-pl"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10037.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}