Reviewer in EMC SourceOne Email Supervisor before 7.2 does not properly limit attempts to authenticate, which makes it easier for remote attackers to obtain access via a brute-force approach.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html | Third Party Advisory |
| http://seclists.org/bugtraq/2015/Oct/58 | Mailing List |
| http://www.securitytracker.com/id/1033787 | Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html | Third Party Advisory |
| http://seclists.org/bugtraq/2015/Oct/58 | Mailing List |
| http://www.securitytracker.com/id/1033787 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/133922/EMC-SourceOne-Email-Supervisor-XSS-Session-Hijacking.html - Third Party Advisory | |
| References | () http://seclists.org/bugtraq/2015/Oct/58 - Mailing List | |
| References | () http://www.securitytracker.com/id/1033787 - Third Party Advisory, VDB Entry |
Information
Published : 2015-10-18 14:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-6843
Mitre link : CVE-2015-6843
CVE.ORG link : CVE-2015-6843
JSON object : View
Products Affected
emc
- sourceone_email_supervisor
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
