### [CVE-2020-5639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5639) ![](https://img.shields.io/static/v1?label=Product&message=FileZen&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Directory%20traversal&color=brighgreen) ### Description Directory traversal vulnerability in FileZen versions from V3.0.0 to V4.2.2 allows remote attackers to upload an arbitrary file in a specific directory via unspecified vectors. As a result, an arbitrary OS command may be executed. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/r0eXpeR/supplier