Generic HTTP Directory Traversal / File Inclusion (Web Application URL Parameter) - Active Check CVE-2005-3947CVE-2009-3151CVE-2010-0759CVE-2010-0760CVE-2011-10009CVE-2014-125125CVE-2018-14957CVE-2018-25113CVE-2019-7254CVE-2020-13886CVE-2021-21234CVE-2021-41291CVE-2022-26271CVE-2023-22047CVE-2023-38879CVE-2023-49031CVE-2024-10100CVE-2024-21136CVE-2024-26291CVE-2024-26293CVE-2024-27292CVE-2024-3234CVE-2024-34470CVE-2024-36527CVE-2024-40422CVE-2024-45241CVE-2024-5334CVE-2024-55457CVE-2024-56198CVE-2024-5926CVE-2024-6911CVE-2024-7928CVE-2025-1743CVE-2025-24963CVE-2025-27956CVE-2025-28367CVE-2025-3021CVE-2025-31131CVE-2025-34031CVE-2025-34047CVE-2025-34048CVE-2025-44137CVE-2025-46002CVE-2025-47423CVE-2025-50971CVE-2025-55526CVE-2025-7488CVE-2025-7625
- Severity
- Not available
- EPSS Score
- EPSS Percentile
- Vulnerability description
- Not available
- Risk description
- Not available
- Recommendation
- Not available
- References
- https://owasp.org/www-community/attacks/Path_Traversalhttps://wiki.owasp.org/index.php/Path_Traversalhttp://projects.webappsec.org/w/page/13246952/Path%20Traversalhttps://owasp.org/www-community/vulnerabilities/PHP_File_Inclusion
- Codename
- Not available
- Detectable with
- Network Scanner
- Scan engine
- OpenVAS
- Cisa Kev
- No
- Exploitable with Sniper
- No
- CVE Published
- Not available
- Detection added at
- Software Type
- Not available
- Vendor
- Not available
- Product
- Not available
Detect this vulnerability now!
Check your clients' targets (or your own) for this vulnerability and thousands more! Get proof for validation with our ethical hacking toolkit.