3 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 12EXPL: 0

McAfee Common Management Agent (CMA) 3.5.5 through 3.5.5.588 and 3.6.0 through 3.6.0.608, and McAfee Agent 4.0 before Patch 3, allows remote authenticated users to overwrite arbitrary files by accessing a report-writing ActiveX control COM object. McAfee Common Management Agent (CMA) v3.5.5 hasta v3.5.5.588 y v3.6.0 hasta v3.6.0.608, y McAfee Agent v4.0 anteriores a Patch 3, permite a usuarios remotos autentificados a sobreescribir ficheros accediendo al objeto COM que es un control ActiveX (report-writing ). • https://exchange.xforce.ibmcloud.com/vulnerabilities/78446 https://kc.mcafee.com/corporate/index?page=content&id=SB10002 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 49%CPEs: 6EXPL: 0

Stack-based buffer overflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.6.0.453 and earlier allows remote attackers to execute arbitrary code via a crafted ping packet. Desbordamiento de búfer basado en pila en McAfee ePolicy Orchestrator 3.5 hasta 3.6.1, ProtectionPilot 1.1.1 y 1.5, y Common Management Agent (CMA) 3.6.0.453 y anteriores permiten a atacantes remotos ejecutar código de su elección mediante un paquete ping artesanal. • http://secunia.com/advisories/26029 http://www.iss.net/threats/269.html http://www.osvdb.org/36099 http://www.securityfocus.com/bid/24863 http://www.securitytracker.com/id?1018363 http://www.vupen.com/english/advisories/2007/2498 https://exchange.xforce.ibmcloud.com/vulnerabilities/31163 https://knowledge.mcafee.com/article/762/613365_f.SAL_Public.html •

CVSS: 7.6EPSS: 11%CPEs: 7EXPL: 0

Heap-based buffer overflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.5.5.438 through 3.6.0.453 allows remote attackers to execute arbitrary code via a crafted packet. Desbordamiento de búfer basado en pila en McAfee ePolicy Orchestrator 3.5 hasta 3.6.1, ProtectionPilot 1.1.1 y 1.5, y Common Management Agent (CMA) 3.5.5.438 hasta 3.6.0.453 permite a atacantes remotos ejecutar código de su elección mediante un paquete artesanal. • http://secunia.com/advisories/26029 http://www.iss.net/threats/269.html http://www.nessus.org/plugins/index.php?view=single&id=25702 http://www.osvdb.org/36100 http://www.securityfocus.com/bid/24863 http://www.securitytracker.com/id?1018363 http://www.vupen.com/english/advisories/2007/2498 https://exchange.xforce.ibmcloud.com/vulnerabilities/31164 https://knowledge.mcafee.com/article/763/613366_f.SAL_Public.html •