{"vulnerability": "cve-2021-29100", "sightings": [{"uuid": "e12707fc-1a06-4f3b-965a-695fe5190cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-29100", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11267", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-29100\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A path traversal vulnerability exists in Esri ArcGIS Earth versions 1.11.0 and below which allows arbitrary file creation on an affected system through crafted input. An attacker could exploit this vulnerability to gain arbitrary code execution under security context of the user running ArcGIS Earth by inducing the user to upload a crafted file to an affected system.\n\ud83d\udccf Published: 2021-05-05T15:16:13.177Z\n\ud83d\udccf Modified: 2025-04-10T15:21:55.572Z\n\ud83d\udd17 References:\n1. https://www.esri.com/arcgis-blog/products/arcgis-earth/administration/arcgis-earth-security-update", "creation_timestamp": "2025-04-10T15:49:13.000000Z"}]}