Directory traversal vulnerability in the API in EMC Secure Remote Services Virtual Edition 3.x before 3.10 allows remote authenticated users to read log files via a crafted parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/135044/EMC-Secure-Remote-Services-Virtual-Edition-Path-Traversal.html - | |
References | () http://seclists.org/bugtraq/2015/Dec/130 - | |
References | () http://www.securityfocus.com/bid/79661 - | |
References | () http://www.securitytracker.com/id/1034530 - |
Information
Published : 2015-12-28 15:59
Updated : 2024-11-21 02:35
NVD link : CVE-2015-6852
Mitre link : CVE-2015-6852
CVE.ORG link : CVE-2015-6852
JSON object : View
Products Affected
emc
- secure_remote_services
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor