Lucene search

K
nvd[email protected]NVD:CVE-2015-3293
HistoryApr 14, 2015 - 6:59 p.m.

CVE-2015-3293

2015-04-1418:59:07
CWE-200
web.nvd.nist.gov
3

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

29.8%

FortiMail 5.0.3 through 5.2.3 allows remote administrators to obtain credentials via the “diag debug application httpd” command.

Affected configurations

Nvd
Node
fortinetfortimailMatch5.0.3
OR
fortinetfortimailMatch5.0.4
OR
fortinetfortimailMatch5.0.5
OR
fortinetfortimailMatch5.0.6
OR
fortinetfortimailMatch5.0.7
OR
fortinetfortimailMatch5.1
OR
fortinetfortimailMatch5.1.1
OR
fortinetfortimailMatch5.1.2
OR
fortinetfortimailMatch5.1.3
OR
fortinetfortimailMatch5.1.4
OR
fortinetfortimailMatch5.2
OR
fortinetfortimailMatch5.2.1
OR
fortinetfortimailMatch5.2.2
OR
fortinetfortimailMatch5.2.3
VendorProductVersionCPE
fortinetfortimail5.0.3cpe:2.3:a:fortinet:fortimail:5.0.3:*:*:*:*:*:*:*
fortinetfortimail5.0.4cpe:2.3:a:fortinet:fortimail:5.0.4:*:*:*:*:*:*:*
fortinetfortimail5.0.5cpe:2.3:a:fortinet:fortimail:5.0.5:*:*:*:*:*:*:*
fortinetfortimail5.0.6cpe:2.3:a:fortinet:fortimail:5.0.6:*:*:*:*:*:*:*
fortinetfortimail5.0.7cpe:2.3:a:fortinet:fortimail:5.0.7:*:*:*:*:*:*:*
fortinetfortimail5.1cpe:2.3:a:fortinet:fortimail:5.1:*:*:*:*:*:*:*
fortinetfortimail5.1.1cpe:2.3:a:fortinet:fortimail:5.1.1:*:*:*:*:*:*:*
fortinetfortimail5.1.2cpe:2.3:a:fortinet:fortimail:5.1.2:*:*:*:*:*:*:*
fortinetfortimail5.1.3cpe:2.3:a:fortinet:fortimail:5.1.3:*:*:*:*:*:*:*
fortinetfortimail5.1.4cpe:2.3:a:fortinet:fortimail:5.1.4:*:*:*:*:*:*:*
Rows per page:
1-10 of 141

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

29.8%

Related for NVD:CVE-2015-3293