From 0d14344256ccc754f1471fc74d03306e0a8b0712 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 21 Feb 2023 17:01:07 -0500 Subject: [PATCH] Enhancement: cves/2015/CVE-2015-2996.yaml by mp --- cves/2015/CVE-2015-2996.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2015/CVE-2015-2996.yaml b/cves/2015/CVE-2015-2996.yaml index 1c1fc5e0a3..96f5d2d28a 100644 --- a/cves/2015/CVE-2015-2996.yaml +++ b/cves/2015/CVE-2015-2996.yaml @@ -8,9 +8,9 @@ info: Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum. reference: - https://seclists.org/fulldisclosure/2015/Jun/8 - - https://nvd.nist.gov/vuln/detail/CVE-2015-2996 - https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk - http://seclists.org/fulldisclosure/2015/Jun/8 + - https://nvd.nist.gov/vuln/detail/CVE-2015-2996 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5