Page 47 of 604 results (0.007 seconds)

CVSS: 6.5EPSS: 0%CPEs: 42EXPL: 0

RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to a Missing Required Cryptographic Step vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key. RSA BSAFE Crypto-J en versiones anteriores a la 6.2.5, son susceptibles a una vulnerabilidad Missing Required Cryptographic Step. Un atacante remoto malicioso podría explotar potencialmente esta vulnerabilidad para obligar a dos partes a calcular la misma clave compartida predecible. • https://kc.mcafee.com/corporate/index?page=content&id=SB10318 https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE&#174%3B-Crypto-J-Multiple-Security-Vulnerabilities https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle • CWE-325: Missing Cryptographic Step CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights. Una vulnerabilidad de Secuestro de Órdenes de Búsqueda de DLL en cliente Microsoft Windows en McAfee Total Protection (MTP) Free Antivirus Trial versión 16.0.R18 y anteriores, permite a usuarios locales ejecutar código arbitrario mediante la ejecución desde una carpeta comprometida colocada por parte de un atacante con derechos de administrador. • http://service.mcafee.com/FAQDocument.aspx?&id=TS102968 • CWE-426: Untrusted Search Path CWE-714: OWASP Top Ten 2007 Category A3 - Malicious File Execution •

CVSS: 9.6EPSS: 0%CPEs: 2EXPL: 0

Reflected Cross Site Scripting vulnerability in Administrators web console in McAfee Web Gateway (MWG) 7.8.x prior to 7.8.2.13 allows remote attackers to collect sensitive information or execute commands with the MWG administrator's credentials via tricking the administrator to click on a carefully constructed malicious link. Una vulnerabilidad de tipo Cross Site Scripting Reflejado en la consola web Administrators en McAfee Web Gateway (MWG) versiones 7.8.x anteriores a 7.8.2.13, permite a atacantes remotos recolectar información confidencial o ejecutar comandos con las credenciales del administrador de MWG mediante el engaño del administrador para que haga clic sobre un enlace malicioso cuidadosamente construido. • https://kc.mcafee.com/corporate/index?page=content&id=SB10294 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 24EXPL: 0

McAfee Web Gateway (MWG) earlier than 7.8.2.13 is vulnerable to a remote attacker exploiting CVE-2019-9517, potentially leading to a denial of service. This affects the scanning proxies. McAfee Web Gateway (MWG) versiones anteriores a 7.8.2.13, es vulnerable para un atacante remoto que explota el CVE-2019-9517, conllevando potencialmente a una denegación de servicio. Esto afecta los proxies de escaneo. • https://kc.mcafee.com/corporate/index?page=content&id=SB10296 •

CVSS: 7.5EPSS: 0%CPEs: 24EXPL: 0

McAfee Web Gateway (MWG) earlier than 7.8.2.13 is vulnerable to a remote attacker exploiting CVE-2019-9511, potentially leading to a denial of service. This affects the scanning proxies. McAfee Web Gateway (MWG) versiones anteriores a 7.8.2.13 es vulnerable para un atacante remoto que explota el CVE-2019-9511, conllevando potencialmente a una denegación de servicio. Esto afecta a los proxies de escaneo. • https://kc.mcafee.com/corporate/index?page=content&id=SB10296 •