Description
getcityapi.yoehoehne is a web server. getcityapi.yoehoehne is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Remediation
References
https://nodesecurity.io/advisories/438
https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne
Related Vulnerabilities
CVE-2022-35143 Vulnerability in npm package raneto
CVE-2019-10754 Vulnerability in maven package org.apereo.cas:cas-server-support-oauth-core-api
CVE-2016-8608 Vulnerability in maven package org.jbpm:jbpm-designer-client
CVE-2018-8037 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2023-40037 Vulnerability in maven package org.apache.nifi:nifi-dbcp-service-api