getcityapi.yoehoehne is a web server. getcityapi.yoehoehne is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0223 getcityapi.yoehoehne is a web server. getcityapi.yoehoehne is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Github GHSA Github GHSA GHSA-4vcm-qfxh-p6c3 Directory Traversal in getcityapi.yoehoehne
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-09-17T02:11:46.475Z

Reserved: 2017-10-29T00:00:00

Link: CVE-2017-16192

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-07T02:29:06.270

Modified: 2024-11-21T03:16:00.390

Link: CVE-2017-16192

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses