Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-25-452/ |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Marvell
Marvell qconvergeconsole |
|
| CPEs | cpe:2.3:a:marvell:qconvergeconsole:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Marvell
Marvell qconvergeconsole |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 07 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 07 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Marvell QConvergeConsole compressDriverFiles Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the compressDriverFiles method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24923. | |
| Title | Marvell QConvergeConsole compressDriverFiles Directory Traversal Information Disclosure Vulnerability | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: zdi
Published: 2025-07-07T14:50:21.270Z
Updated: 2025-07-07T16:19:33.924Z
Reserved: 2025-06-27T14:58:05.214Z
Link: CVE-2025-6803
Updated: 2025-07-07T16:19:30.869Z
Status : Analyzed
Published: 2025-07-07T15:15:31.270
Modified: 2025-07-14T17:12:58.733
Link: CVE-2025-6803
No data.