Vulnerability Details CVE-2015-2862
Directory traversal vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 allows remote authenticated users to read arbitrary files via a crafted HTTP request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.039
EPSS Ranking 87.8%
CVSS Severity
CVSS v2 Score 4.0
Products affected by CVE-2015-2862
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.0
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.1
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.10
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.11
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.12
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.13
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.14
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.15
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.16
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.17
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.18
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.19
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.2
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.20
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.21
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.22
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.23
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.24
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.25
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.26
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.27
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.28
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.3
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.4
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.5
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.6
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.7
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.8
-
cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.9
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.1
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.10
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.11
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.12
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.13
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.14
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.15
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.16
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.17
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.2
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.3
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.4
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.5
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.6
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.7
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.8
-
cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.9
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.1
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.10
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.11
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.12
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.13
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.2
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.3
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.4
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.5
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.6
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.7
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.8
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.9
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.1
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.2
-
cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.3