3 results (0.006 seconds)

CVSS: 8.8EPSS: 92%CPEs: 1EXPL: 1

The administration interface in McAfee E-Business Server 8.5.2 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a long initial authentication packet. La interfaz de administración en McAfee E-Business Server 8.5.2 y anteriores permite a atacantes remotos provocar una denegación de servicio (caída) y ejecutar código de su elección mediante un paquete de autenticación inicial largo. • https://www.exploit-db.com/exploits/4878 http://secunia.com/advisories/28408 http://securityreason.com/securityalert/3530 http://securitytracker.com/id?1019170 http://www.securityfocus.com/archive/1/485992/100/0/threaded http://www.securityfocus.com/archive/1/486035/100/0/threaded http://www.securityfocus.com/bid/27197 http://www.vupen.com/english/advisories/2008/0087 https://exchange.xforce.ibmcloud.com/vulnerabilities/39561 https://exchange.xforce.ibmcloud.com/vulnerabilities/39563 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 8%CPEs: 4EXPL: 0

Integer overflow in McAfee E-Business Server before 8.5.3 for Solaris, and before 8.1.2 for Linux, HP-UX, and AIX, allows remote attackers to execute arbitrary code via a large length value in an authentication packet, which results in a heap-based buffer overflow. Desbordamiento de entero en McAfee E-Business Server anterior a 8.5.3 para Solaris, y anterior a 8.1.2 para Linux, HP-UX, y AIX, permite a atacantes remotos ejecutar código de su elección mediante un valor de gran longitud en un paquete de autenticación, lo cual resulta en un desbordamiento de búfer basado en montículo. • http://secunia.com/advisories/26372 http://secunia.com/secunia_research/2007-69/advisory http://securitytracker.com/id?1018878 http://www.securityfocus.com/bid/26269 http://www.vupen.com/english/advisories/2007/3663 https://exchange.xforce.ibmcloud.com/vulnerabilities/38175 https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=614035&sliceId=SAL_Public&command=show&forward=nonthreadedKC&kcId=614035 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability." • http://www.osvdb.org/1946 http://www.pgp.com/support/product-advisories/pgpsdk.asp http://www.securityfocus.com/archive/1/211806 http://www.securityfocus.com/bid/3280 https://exchange.xforce.ibmcloud.com/vulnerabilities/7081 •