4.3
CVE-2015-6852
- EPSS 0.15%
- Veröffentlicht 28.12.2015 15:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle security_alert@emc.com
- Teams Watchlist Login
- Unerledigt Login
Directory traversal vulnerability in the API in EMC Secure Remote Services Virtual Edition 3.x before 3.10 allows remote authenticated users to read log files via a crafted parameter.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Emc ≫ Secure Remote Services Version3.0 SwEditionvirtual
Emc ≫ Secure Remote Services Version3.02 SwEditionvirtual
Emc ≫ Secure Remote Services Version3.03 SwEditionvirtual
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.15% | 0.358 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.