No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 13 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:stvs:provision:5.5:*:*:*:*:*:*:* cpe:2.3:a:stvs:provision:5.6:*:*:*:*:*:*:* cpe:2.3:a:stvs:provision:5.7:*:*:*:*:*:*:* cpe:2.3:a:stvs:provision:5.8.6:*:*:*:*:*:*:* cpe:2.3:a:stvs:provision:5.9.0:*:*:*:*:*:*:* cpe:2.3:a:stvs:provision:5.9.10:*:*:*:*:*:*:* cpe:2.3:a:stvs:provision:5.9.1:*:*:*:*:*:*:* cpe:2.3:a:stvs:provision:5.9.7:*:*:*:*:*:*:* cpe:2.3:a:stvs:provision:5.9.9:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Fri, 12 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stvs
Stvs provision |
|
| Vendors & Products |
Stvs
Stvs provision |
Tue, 09 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | STVS ProVision 5.9.10 contains a path traversal vulnerability that allows authenticated attackers to access arbitrary files by manipulating the files parameter in the archive download functionality. Attackers can send GET requests to /archive/download with directory traversal sequences to read sensitive system files like /etc/passwd. | |
| Title | STVS ProVision Authenticated File Disclosure via archive.rb | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-12T16:32:20.716Z
Reserved: 2025-12-07T14:25:05.584Z
Link: CVE-2021-47724
Updated: 2025-12-12T16:32:17.757Z
Status : Analyzed
Published: 2025-12-09T21:15:50.927
Modified: 2026-02-13T17:35:33.787
Link: CVE-2021-47724
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:32Z