7 results (0.007 seconds)

CVSS: 8.8EPSS: 92%CPEs: 1EXPL: 1

The administration interface in McAfee E-Business Server 8.5.2 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a long initial authentication packet. La interfaz de administración en McAfee E-Business Server 8.5.2 y anteriores permite a atacantes remotos provocar una denegación de servicio (caída) y ejecutar código de su elección mediante un paquete de autenticación inicial largo. • https://www.exploit-db.com/exploits/4878 http://secunia.com/advisories/28408 http://securityreason.com/securityalert/3530 http://securitytracker.com/id?1019170 http://www.securityfocus.com/archive/1/485992/100/0/threaded http://www.securityfocus.com/archive/1/486035/100/0/threaded http://www.securityfocus.com/bid/27197 http://www.vupen.com/english/advisories/2008/0087 https://exchange.xforce.ibmcloud.com/vulnerabilities/39561 https://exchange.xforce.ibmcloud.com/vulnerabilities/39563 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 8%CPEs: 4EXPL: 0

Integer overflow in McAfee E-Business Server before 8.5.3 for Solaris, and before 8.1.2 for Linux, HP-UX, and AIX, allows remote attackers to execute arbitrary code via a large length value in an authentication packet, which results in a heap-based buffer overflow. Desbordamiento de entero en McAfee E-Business Server anterior a 8.5.3 para Solaris, y anterior a 8.1.2 para Linux, HP-UX, y AIX, permite a atacantes remotos ejecutar código de su elección mediante un valor de gran longitud en un paquete de autenticación, lo cual resulta en un desbordamiento de búfer basado en montículo. • http://secunia.com/advisories/26372 http://secunia.com/secunia_research/2007-69/advisory http://securitytracker.com/id?1018878 http://www.securityfocus.com/bid/26269 http://www.vupen.com/english/advisories/2007/3663 https://exchange.xforce.ibmcloud.com/vulnerabilities/38175 https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=614035&sliceId=SAL_Public&command=show&forward=nonthreadedKC&kcId=614035 • CWE-189: Numeric Errors •

CVSS: 7.6EPSS: 3%CPEs: 5EXPL: 0

Integer underflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.6.0.453 and earlier allows remote attackers to execute arbitrary code via a crafted UDP packet, which causes stack corruption. Desbordamiento inferior de un entero en el McAfee ePolicy Orchestrator 3.5 hasta el 3.6.1, el ProtectionPilot 1.1.1 y 1.5 y el Common Management Agent (CMA) 3.6.0.453 y versiones anteriores permite a atacantes remotos ejecutar código de su elección a través de paquetes UDP manipulados, lo que produce una corrupción de pila. • http://secunia.com/advisories/26029 http://www.iss.net/threats/269.html http://www.osvdb.org/36098 http://www.securityfocus.com/bid/24863 http://www.securitytracker.com/id?1018363 http://www.vupen.com/english/advisories/2007/2498 https://exchange.xforce.ibmcloud.com/vulnerabilities/31162 https://knowledge.mcafee.com/article/761/613364_f.SAL_Public.html •

CVSS: 7.5EPSS: 49%CPEs: 6EXPL: 0

Stack-based buffer overflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.6.0.453 and earlier allows remote attackers to execute arbitrary code via a crafted ping packet. Desbordamiento de búfer basado en pila en McAfee ePolicy Orchestrator 3.5 hasta 3.6.1, ProtectionPilot 1.1.1 y 1.5, y Common Management Agent (CMA) 3.6.0.453 y anteriores permiten a atacantes remotos ejecutar código de su elección mediante un paquete ping artesanal. • http://secunia.com/advisories/26029 http://www.iss.net/threats/269.html http://www.osvdb.org/36099 http://www.securityfocus.com/bid/24863 http://www.securitytracker.com/id?1018363 http://www.vupen.com/english/advisories/2007/2498 https://exchange.xforce.ibmcloud.com/vulnerabilities/31163 https://knowledge.mcafee.com/article/762/613365_f.SAL_Public.html •

CVSS: 7.6EPSS: 11%CPEs: 7EXPL: 0

Heap-based buffer overflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.5.5.438 through 3.6.0.453 allows remote attackers to execute arbitrary code via a crafted packet. Desbordamiento de búfer basado en pila en McAfee ePolicy Orchestrator 3.5 hasta 3.6.1, ProtectionPilot 1.1.1 y 1.5, y Common Management Agent (CMA) 3.5.5.438 hasta 3.6.0.453 permite a atacantes remotos ejecutar código de su elección mediante un paquete artesanal. • http://secunia.com/advisories/26029 http://www.iss.net/threats/269.html http://www.nessus.org/plugins/index.php?view=single&id=25702 http://www.osvdb.org/36100 http://www.securityfocus.com/bid/24863 http://www.securitytracker.com/id?1018363 http://www.vupen.com/english/advisories/2007/2498 https://exchange.xforce.ibmcloud.com/vulnerabilities/31164 https://knowledge.mcafee.com/article/763/613366_f.SAL_Public.html •