Search for packages
| purl | pkg:maven/com.virjar/ratel-api@1.0.0 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-msck-u3y4-tqcn
Aliases: CVE-2021-29425 GHSA-gwrp-pvrq-jmwv |
Path Traversal and Improper Input Validation in Apache Commons IO In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T21:21:48.953363+00:00 | GitLab Importer | Affected by | VCID-msck-u3y4-tqcn | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/com.virjar/ratel-api/CVE-2021-29425.yml | 38.4.0 |
| 2026-04-11T22:34:19.560834+00:00 | GitLab Importer | Affected by | VCID-msck-u3y4-tqcn | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/com.virjar/ratel-api/CVE-2021-29425.yml | 38.3.0 |
| 2026-04-02T22:45:24.797362+00:00 | GitLab Importer | Affected by | VCID-msck-u3y4-tqcn | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/com.virjar/ratel-api/CVE-2021-29425.yml | 38.1.0 |
| 2026-04-02T16:56:31.978218+00:00 | GHSA Importer | Affected by | VCID-msck-u3y4-tqcn | https://github.com/advisories/GHSA-gwrp-pvrq-jmwv | 38.1.0 |
| 2026-04-01T17:03:22.651391+00:00 | GitLab Importer | Affected by | VCID-msck-u3y4-tqcn | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/com.virjar/ratel-api/CVE-2021-29425.yml | 38.0.0 |