Логотип exploitDog
bind:CVE-2024-55550
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-55550

Количество 3

Количество 3

nvd логотип

CVE-2024-55550

около 1 года назад

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

CVSS3: 2.7
EPSS: Средний
github логотип

GHSA-4c8h-4mm2-mm5g

около 1 года назад

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

CVSS3: 4.4
EPSS: Средний
fstec логотип

BDU:2025-00510

больше 1 года назад

Уязвимость платформы для совместной работы Mitel MiCollab, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю читать произвольные файлы

CVSS3: 4.4
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-55550

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

CVSS3: 2.7
12%
Средний
около 1 года назад
github логотип
GHSA-4c8h-4mm2-mm5g

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

CVSS3: 4.4
12%
Средний
около 1 года назад
fstec логотип
BDU:2025-00510

Уязвимость платформы для совместной работы Mitel MiCollab, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю читать произвольные файлы

CVSS3: 4.4
12%
Средний
больше 1 года назад

Уязвимостей на страницу