Page 12 of 88 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 41EXPL: 0

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://access.redhat.com/errata/RHBA-2019:0959 https://access.redhat.com/errata/RHSA-2019:1146 https://access.redhat.com/errata • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in McAfee ePO (legacy) Cloud allows unauthenticated users to perform unintended ePO actions using an authenticated user's session via unspecified vectors. Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en McAfee ePO (legacy) Cloud permite a los usuarios no autenticados realizar acciones ePO no deseadas, utilizando la sesión de un usuario autenticado mediante vectores sin especificar. • http://www.securityfocus.com/bid/106830 https://kc.mcafee.com/corporate/index?page=content&id=SB10268 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Information disclosure vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows authenticated users to view sensitive information in plain text format via unspecified vectors. Vulnerabilidad de divulgación de información en McAfee ePolicy Orchestrator (ePO) desde la versión 5.3.0 hasta la 5.3.3 y de la versión 5.9.0 a la 5.9.1 permite que usuarios autenticados vean información sensible en formato de texto plano mediante vectores sin especificar. • http://www.securityfocus.com/bid/104485 http://www.securitytracker.com/id/1041155 https://kc.mcafee.com/corporate/index?page=content&id=SB10240 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 2%CPEs: 2EXPL: 1

Application Protection Bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request. Vulnerabilidad de omisión de la protección de la aplicación en McAfee ePolicy Orchestrator (ePO) desde la versión 5.3.0 hasta la 5.3.3 y desde la versión 5.9.0 hasta la 5.9.1 permite que usuarios remotos autenticados omitan la protección de seguridad de acceso "solo localhost" para algunas características ePO mediante una petición HTTP especialmente manipulada. McAfee ePO version 5.9.1 suffers from a local access bypass vulnerability. • https://www.exploit-db.com/exploits/46518 http://www.securityfocus.com/bid/104485 http://www.securitytracker.com/id/1041155 https://kc.mcafee.com/corporate/index?page=content&id=SB10240 •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

OS Command Injection vulnerability in McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, 5.3.1, 5.1.3, 5.1.2, 5.1.1, and 5.1.0 allows attackers to run arbitrary OS commands with limited privileges via not sanitizing the user input data before exporting it into a CSV format output. Vulnerabilidad de inyección de comandos del sistema operativo en McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, 5.3.1, 5.1.3, 5.1.2, 5.1.1 y 5.1.0 permite que los atacantes ejecuten comandos del sistema operativo con privilegios limitados al no sanear los datos de entrada del usuario antes de exportarlos a formato CSV. • http://www.securityfocus.com/bid/103155 https://kc.mcafee.com/corporate/index?page=content&id=SB10227 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •