Page 3 of 17 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

HPE ArcSight ESM before 6.8c, and ArcSight ESM Express before 6.9.1, allows remote authenticated users to obtain sensitive information via unspecified vectors. HPE ArcSight ESM en versiones anterioes a 6.8c y ArcSight ESM Express en versiones anteriores a 6.9.1, permiten a usuarios remotos autenticados obtener información sensible a través de vectores no especificados. • http://www.securitytracker.com/id/1035307 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05048753 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 81%CPEs: 58EXPL: 0

The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages. El cliente ntpd en NTP 4.x en versiones anteriores a 4.2.8p4, y 4.3.x en versiones anteriores a 4.3.77 permite que atacantes remotos provoquen una denegación de servicio empleando una serie de mensajes "KOD" manipulados. It was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. A remote attacker could use this flaw to send a crafted Kiss-of-Death packet to an ntpd client that would increase the client's polling interval value, and effectively disable synchronization with the server. • http://bugs.ntp.org/show_bug.cgi?id=2901 http://rhn.redhat.com/errata/RHSA-2015-1930.html http://rhn.redhat.com/errata/RHSA-2015-2520.html http://support.ntp.org/bin/view/Main/NtpBug2901 http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit http://www.debian.org/security/2015/dsa-3388 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/77280 http://www.securitytracker.com/id/1 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 9EXPL: 0

McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) before 9.3.2MR18, 9.4.x before 9.4.2MR8, and 9.5.x before 9.5.0MR7 allow remote authenticated users to execute arbitrary OS commands via a crafted filename, which is not properly handled when downloading the file. Vulnerabilidad en McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM) y Enterprise Security Manager/Receiver (ESMREC) en versiones anteriores a 9.3.2MR18, 9.4.x en versiones anteriores a 9.4.2MR8 y 9.5.x en versiones anteriores a 9.5.0MR7, permite a usuarios remotos autenticados ejecutar comandos del SO arbitrarios a través de un nombre de archivo manipulado que no es manejado correctamente al descargar el archivo. • http://www.securitytracker.com/id/1033654 https://kc.mcafee.com/corporate/index?page=content&id=SB10133 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

Multiple unquoted Windows search path vulnerabilities in the (1) Manager and (2) Agent components in Symantec Enterprise Security Manager (ESM) before 11.0 allow local users to gain privileges via unspecified vectors. Múltiples vulnerabilidades en ruta de búsqueda en Windows en los componentes (1) Manager y (2) Agent en Symantec Enterprise Security Manager (ESM) antes de v11.0, permite a usuarios locales ganar privilegios a través de vectores no especificados. • http://www.securityfocus.com/bid/56915 http://www.securitytracker.com/id?1027874 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20121213_00 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Race condition in the Symantec Enterprise Security Manager (ESM) 6.5.3 managers and agents on Windows before 20070524 allows remote attackers to cause a denial of service (CPU consumption and application hang) via certain network scans to ESM ports. Condición de carrera en los encargados y agentes de Symantec Enterprise Security Manager (ESM) 6.5.3 en Windows anteriores a la fecha 24/05/2007 permite a atacantes remotos causar una denegación de servicio (agotamiento de la CPU y cuelgue de aplicación) a través de determinados escaneos de red a los puertos ESM. • http://osvdb.org/35077 http://secunia.com/advisories/25390 http://securityresponse.symantec.com/avcenter/security/Content/2007.05.24a.html http://securityresponse.symantec.com/avcenter/security/Content/2007.05.24b.html http://www.securityfocus.com/bid/24123 http://www.securitytracker.com/id?1018120 http://www.vupen.com/english/advisories/2007/1940 https://exchange.xforce.ibmcloud.com/vulnerabilities/34507 •