53134612323

CVE-2024-56179

Aug 20th, 2025 (edited)
376
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.73 KB | None | 0 0
  1. Vulnerability type: Directory Traversal
  2. Vendor of the product: MindManager
  3. Product: MindManager Windows
  4. Version: MindManager versions prior to 24.1.150
  5. Has the vendor confirmed or acknowledged the vulnerability: Yes
  6. Attack type: Local
  7. Impact: Other (File Write)
  8. Affected Components: N/A
  9. Attack Vectors: To exploit the issue, the victim must open a malicious mmap file, then open a file attachment within said file.
  10. Suggested Description: In MindManager Windows versions prior to 24.1.150, attackers could potentially write to unexpected directories in victims' machines via directory traversal if victims opened file attachments located in malicious mmap files.
  11. Discoverer/Credits: Ianis Bernard from NATO Cyber Security Centre (NCSC)
Advertisement
Add Comment
Please, Sign In to add comment