| ID | CVE-2025-59818 | ||||||
| Sažetak | This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file. | ||||||
| Reference |
|
||||||
| CVSS |
|
||||||
| Pristup |
|
||||||
| Impact |
|
||||||
| CVSS vektor | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | ||||||
| Zadnje važnije ažuriranje | 04-02-2026 - 16:33 | ||||||
| Objavljeno | 04-02-2026 - 11:16 |

