Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2015-5383
Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to obtain sensitive information by reading files in the (1) config, (2) temp, or (3) logs directory.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.018
EPSS Ranking
81.8%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
http://www.openwall.com/lists/oss-security/2015/07/07/2
https://github.com/roundcube/roundcubemail/commit/012555c1cef35601b543cde67bff8726de97eb39
https://github.com/roundcube/roundcubemail/issues/4816
https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released
http://www.openwall.com/lists/oss-security/2015/07/07/2
https://github.com/roundcube/roundcubemail/commit/012555c1cef35601b543cde67bff8726de97eb39
https://github.com/roundcube/roundcubemail/issues/4816
https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released
Products affected by CVE-2015-5383
Roundcube
»
Roundcube Webmail
»
Version:
1.1.1
cpe:2.3:a:roundcube:roundcube_webmail:1.1.1
Roundcube
»
Webmail
»
Version:
1.1
cpe:2.3:a:roundcube:webmail:1.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved