Page 2 of 18 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

27 Jun 2019 — Privilege escalation in McAfee Enterprise Security Manager (ESM) 11.x prior to 11.2.0 allows authenticated user to gain access to a core system component via incorrect access control. La escalada de privilegios en McAfee Enterprise Security Manager (ESM) 11.x antes de la 11.2.0 permite al usuario identificado obtener acceso a un componente central del sistema a través del control de acceso incorrecto. • https://kc.mcafee.com/corporate/index?page=content&id=SB10284 •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

16 Mar 2016 — HPE ArcSight ESM before 6.8c, and ArcSight ESM Express before 6.9.1, allows remote authenticated users to obtain sensitive information via unspecified vectors. HPE ArcSight ESM en versiones anterioes a 6.8c y ArcSight ESM Express en versiones anteriores a 6.9.1, permiten a usuarios remotos autenticados obtener información sensible a través de vectores no especificados. A potential security vulnerability has been identified with ArcSight ESM and ESM Express. The vulnerability could be remotely exploited to a... • http://www.securitytracker.com/id/1035307 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 52%CPEs: 58EXPL: 0

21 Oct 2015 — The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages. El cliente ntpd en NTP 4.x en versiones anteriores a 4.2.8p4, y 4.3.x en versiones anteriores a 4.3.77 permite que atacantes remotos provoquen una denegación de servicio empleando una serie de mensajes "KOD" manipulados. It was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. A remote attacker could use thi... • http://bugs.ntp.org/show_bug.cgi?id=2901 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 9EXPL: 0

22 Sep 2015 — McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) before 9.3.2MR18, 9.4.x before 9.4.2MR8, and 9.5.x before 9.5.0MR7 allow remote authenticated users to execute arbitrary OS commands via a crafted filename, which is not properly handled when downloading the file. Vulnerabilidad en McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM) y Enterprise Security Manager/Receiver (ESMREC) e... • http://www.securitytracker.com/id/1033654 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

18 Dec 2012 — Multiple unquoted Windows search path vulnerabilities in the (1) Manager and (2) Agent components in Symantec Enterprise Security Manager (ESM) before 11.0 allow local users to gain privileges via unspecified vectors. Múltiples vulnerabilidades en ruta de búsqueda en Windows en los componentes (1) Manager y (2) Agent en Symantec Enterprise Security Manager (ESM) antes de v11.0, permite a usuarios locales ganar privilegios a través de vectores no especificados. • http://www.securityfocus.com/bid/56915 •

CVSS: 5.9EPSS: 1%CPEs: 2EXPL: 0

30 May 2007 — Race condition in the Symantec Enterprise Security Manager (ESM) 6.5.3 managers and agents on Windows before 20070524 allows remote attackers to cause a denial of service (CPU consumption and application hang) via certain network scans to ESM ports. Condición de carrera en los encargados y agentes de Symantec Enterprise Security Manager (ESM) 6.5.3 en Windows anteriores a la fecha 24/05/2007 permite a atacantes remotos causar una denegación de servicio (agotamiento de la CPU y cuelgue de aplicación) a travé... • http://osvdb.org/35077 •

CVSS: 10.0EPSS: 6%CPEs: 5EXPL: 0

30 Apr 2007 — The agent remote upgrade interface in Symantec Enterprise Security Manager (ESM) before 20070405 does not verify the authenticity of upgrades, which allows remote attackers to execute arbitrary code via software that implements the agent upgrade protocol. El agente remoto de la interfaz de actualización en Symantec Enterprise Security Manager (ESM) anterior a 20070405 no verifica la autenticidad de las actualizaciones, lo cual permite a un atacante remoto ejecutar código de su elección a través de software ... • http://secunia.com/advisories/24767 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

23 Aug 2006 — The manager server in Symantec Enterprise Security Manager (ESM) 6 and 6.5.x allows remote attackers to cause a denial of service (hang) via a malformed ESM agent request. El servidor de administración en Symantec Enterprise Security Manager (ESM) 6 y 6.5.x permite a atacantes remotos provocar una denegación de servicio (la aplicación no responde) mediante una petición de agente ESM mal formada. • http://secunia.com/advisories/21548 •