// For flags

CVE-2015-9288

 

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Unity Web Player plugin before 4.6.6f2 and 5.x before 5.0.3f2 allows attackers to read messages or access online services via a victim's credentials

El plugin Unity Web Player anterior a versión 4.6.6f2 y versiones 5.x anteriores a 5.0.3f2, permite a los atacantes leer mensajes o acceder a servicios en línea por medio de credenciales de una víctima

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-27 CVE Reserved
  • 2019-07-29 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Unity
Search vendor "Unity"
Web Player
Search vendor "Unity" for product "Web Player"
< 4.6.6f2
Search vendor "Unity" for product "Web Player" and version " < 4.6.6f2"
-
Affected
Unity
Search vendor "Unity"
Web Player
Search vendor "Unity" for product "Web Player"
>= 5.0 < 5.0.3f2
Search vendor "Unity" for product "Web Player" and version " >= 5.0 < 5.0.3f2"
-
Affected