Page 3 of 15 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 9EXPL: 0

McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) before 9.3.2MR18, 9.4.x before 9.4.2MR8, and 9.5.x before 9.5.0MR7 allow remote authenticated users to execute arbitrary OS commands via a crafted filename, which is not properly handled when downloading the file. Vulnerabilidad en McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM) y Enterprise Security Manager/Receiver (ESMREC) en versiones anteriores a 9.3.2MR18, 9.4.x en versiones anteriores a 9.4.2MR8 y 9.5.x en versiones anteriores a 9.5.0MR7, permite a usuarios remotos autenticados ejecutar comandos del SO arbitrarios a través de un nombre de archivo manipulado que no es manejado correctamente al descargar el archivo. • http://www.securitytracker.com/id/1033654 https://kc.mcafee.com/corporate/index?page=content&id=SB10133 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

Multiple unquoted Windows search path vulnerabilities in the (1) Manager and (2) Agent components in Symantec Enterprise Security Manager (ESM) before 11.0 allow local users to gain privileges via unspecified vectors. Múltiples vulnerabilidades en ruta de búsqueda en Windows en los componentes (1) Manager y (2) Agent en Symantec Enterprise Security Manager (ESM) antes de v11.0, permite a usuarios locales ganar privilegios a través de vectores no especificados. • http://www.securityfocus.com/bid/56915 http://www.securitytracker.com/id?1027874 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20121213_00 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Race condition in the Symantec Enterprise Security Manager (ESM) 6.5.3 managers and agents on Windows before 20070524 allows remote attackers to cause a denial of service (CPU consumption and application hang) via certain network scans to ESM ports. Condición de carrera en los encargados y agentes de Symantec Enterprise Security Manager (ESM) 6.5.3 en Windows anteriores a la fecha 24/05/2007 permite a atacantes remotos causar una denegación de servicio (agotamiento de la CPU y cuelgue de aplicación) a través de determinados escaneos de red a los puertos ESM. • http://osvdb.org/35077 http://secunia.com/advisories/25390 http://securityresponse.symantec.com/avcenter/security/Content/2007.05.24a.html http://securityresponse.symantec.com/avcenter/security/Content/2007.05.24b.html http://www.securityfocus.com/bid/24123 http://www.securitytracker.com/id?1018120 http://www.vupen.com/english/advisories/2007/1940 https://exchange.xforce.ibmcloud.com/vulnerabilities/34507 •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 0

The agent remote upgrade interface in Symantec Enterprise Security Manager (ESM) before 20070405 does not verify the authenticity of upgrades, which allows remote attackers to execute arbitrary code via software that implements the agent upgrade protocol. El agente remoto de la interfaz de actualización en Symantec Enterprise Security Manager (ESM) anterior a 20070405 no verifica la autenticidad de las actualizaciones, lo cual permite a un atacante remoto ejecutar código de su elección a través de software que implemente el agente del protocolo de actualización. • http://secunia.com/advisories/24767 http://www.securityfocus.com/bid/23287 http://www.securitytracker.com/id?1017881 http://www.symantec.com/avcenter/security/Content/2007.04.05d.html http://www.vupen.com/english/advisories/2007/1277 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

The manager server in Symantec Enterprise Security Manager (ESM) 6 and 6.5.x allows remote attackers to cause a denial of service (hang) via a malformed ESM agent request. El servidor de administración en Symantec Enterprise Security Manager (ESM) 6 y 6.5.x permite a atacantes remotos provocar una denegación de servicio (la aplicación no responde) mediante una petición de agente ESM mal formada. • http://secunia.com/advisories/21548 http://securityreason.com/securityalert/1437 http://securitytracker.com/id?1016728 http://www.osvdb.org/28108 http://www.securityfocus.com/archive/1/444068/100/0/threaded http://www.securityfocus.com/bid/19580 http://www.symantec.com/avcenter/security/Content/2006.08.21a.html http://www.vupen.com/english/advisories/2006/3353 •