Количество 3
Количество 3

CVE-2025-27920
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
GHSA-66q6-24vw-2g98
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.

BDU:2025-06724
Уязвимость инструмента обмена сообщениями и видеоконференций Output Messenger, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю раскрыть защищаемую информацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-27920 Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access. | CVSS3: 7.2 | 58% Средний | около 2 месяцев назад |
GHSA-66q6-24vw-2g98 Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access. | CVSS3: 9.8 | 58% Средний | около 2 месяцев назад | |
![]() | BDU:2025-06724 Уязвимость инструмента обмена сообщениями и видеоконференций Output Messenger, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 7.2 | 58% Средний | 6 месяцев назад |
Уязвимостей на страницу