53134612323

CVE-2024-56179

Aug 20th, 2025 (edited)
1,125
0
Never
5
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.73 KB | None | 0 0
  1. Vulnerability type: Directory Traversal
  2. Vendor of the product: MindManager
  3. Product: MindManager Windows
  4. Version: MindManager versions prior to 24.1.150
  5. Has the vendor confirmed or acknowledged the vulnerability: Yes
  6. Attack type: Local
  7. Impact: Other (File Write)
  8. Affected Components: N/A
  9. Attack Vectors: To exploit the issue, the victim must open a malicious mmap file, then open a file attachment within said file.
  10. Suggested Description: In MindManager Windows versions prior to 24.1.150, attackers could potentially write to unexpected directories in victims' machines via directory traversal if victims opened file attachments located in malicious mmap files.
  11. Discoverer/Credits: Ianis Bernard from NATO Cyber Security Centre (NCSC)
Advertisement
Comments
  • User was banned
  • User was banned
  • User was banned
  • kokta69
    9 days
    # CSS 0.05 KB | 0 0
    1. You literally stole it from https://t.me/theprotocolone
  • User was banned
Add Comment
Please, Sign In to add comment