Multiple vulnerabilities exist in Barracuda Networks products due to improper validation of user-controlled input. User-controllable input supplied to the embedded web server is not properly sanitized for illegal path delimiting characters prior to being used to access files. A specially crafted HTTP request containing directory traversal sequences could allow remote attackers to conduct traversal attacks.
The vendor has released Security Definition update v2.0.4 that addresses these vulnerabilities.
WordPress Plugin Count per Day Arbitrary File Download and Cross-Site Scripting Vulnerabilities (3.1)
WordPress Plugin Simple Ads Manager Local File Inclusion (22.214.171.124)
WordPress Plugin WP Publication Archive 'file' Parameter Directory Traversal (2.3)
WordPress Plugin Leaflet Maps Marker Pro Multiple Vulnerabilities (1.5.7)