Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-7238 | First vendor Publication | 2015-09-18 |
Vendor | Cve | Last vendor Modification | 2015-09-22 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Secondary server in Threat Intelligence Exchange (TIE) before 1.2.0 uses weak permissions for unspecified (1) configuration files and (2) installation logs, which allows local users to obtain sensitive information by reading the files. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7238 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
Sources (Detail)
Source | Url |
---|---|
CONFIRM | https://kc.mcafee.com/corporate/index?page=content&id=SB10132 |
Alert History
Date | Informations |
---|---|
2021-04-22 01:52:02 |
|
2020-05-23 01:57:08 |
|
2020-05-23 00:47:00 |
|
2016-06-30 22:34:34 |
|
2015-09-23 00:23:02 |
|
2015-09-18 21:24:36 |
|