| ID | CVE-2025-1127 | ||||||
| Sažetak | The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user and/or modify the contents of any data on the filesystem. | ||||||
| Reference | |||||||
| CVSS |
|
||||||
| Pristup |
|
||||||
| Impact |
|
||||||
| CVSS vektor | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H | ||||||
| Zadnje važnije ažuriranje | 13-02-2025 - 19:15 | ||||||
| Objavljeno | 13-02-2025 - 19:15 |

