Page 51 of 604 results (0.007 seconds)

CVSS: 8.2EPSS: 0%CPEs: 3EXPL: 0

Files or Directories Accessible to External Parties in McAfee Data Loss Prevention (DLPe) for Windows 11.x prior to 11.3.0 allows authenticated user to redirect DLPe log files to arbitrary locations via incorrect access control applied to the DLPe log folder allowing privileged users to create symbolic links. Archivos o directorios accesibles para terceros en McAfee Data Loss Prevention (DLPe) para Windows en versiones 11.x versiones anteriores a la 11.3.0 permiten al usuario autenticado redirigir los archivos de registro de DLPe a ubicaciones arbitrarias mediante el control de acceso incorrecto aplicado a la carpeta de registro de DLPe que permite a los usuarios privilegiados crear enlaces simbólicos. • http://www.securityfocus.com/bid/109370 https://kc.mcafee.com/corporate/index?page=content&id=SB10290 • CWE-552: Files or Directories Accessible to External Parties •

CVSS: 6.1EPSS: 0%CPEs: 3EXPL: 0

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ePO extension in McAfee Data Loss Prevention (DLPe) for Windows 11.x prior to 11.3.0 allows unauthenticated remote user to trigger specially crafted JavaScript to render in the ePO UI via a carefully crafted upload to a remote website which is correctly blocked by DLPe Web Protection. This would then render as an XSS when the DLP Admin viewed the event in the ePO UI. Neutralización inadecuada de la entrada durante la generación de páginas web ('Cross-site Scripting') en la extensión ePO en McAfee Data Loss Prevention (DLPe) para Windows 11.x antes de la 11.3.0 permite a un usuario remoto no autenticado activar un JavaScript especialmente diseñado para renderizar en el ePO UI a través de una carga cuidadosamente diseñada a un sitio web remoto que está correctamente bloqueado por DLPe Web Protection. Esto luego se representaría como un XSS cuando el administrador de DLP viera el evento en la interfaz de usuario de ePO. • http://www.securityfocus.com/bid/109377 https://kc.mcafee.com/corporate/index?page=content&id=SB10289 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Improper Neutralization of Special Elements used in a Command ('Command Injection') in ePO extension in McAfee Data Loss Prevention (DLP) 11.x prior to 11.3.0 allows Authenticated Adminstrator to execute arbitrary code with their local machine privileges via a specially crafted DLP policy, which is exported and opened on the their machine. In our checks, the user must explicitly allow the code to execute. La neutralización inadecuada de elementos especiales utilizados en un comando ('Command Injection') en la extensión ePO en McAfee Data Loss Prevention (DLP) 11.x antes de la versión 11.3.0 permite al administrador autenticado ejecutar código arbitrario con sus privilegios de máquina local a través de una Política de DLP especialmente diseñada, que es exportada y abierta en su máquina. En nuestras verificaciones, el usuario debe permitir explícitamente que se ejecute el código. • http://www.securityfocus.com/bid/109377 https://kc.mcafee.com/corporate/index?page=content&id=SB10289 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 3.1EPSS: 0%CPEs: 20EXPL: 0

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://kc.mcafee.com/corporate/index?page=content&id=SB10300 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us •

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://kc.mcafee.com/corporate/index?page=content&id=SB10300 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us https://usn.ubuntu.com/4080-1 https://access.redhat.com/security/cve/CVE-2019-2842 https://bugzilla.redhat.com/show_bug.cgi?id=1730110 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •