CVE-2017-3972 – SB10192 - Network Security Management (NSM) - Infrastructure-based foot printing vulnerability
https://notcve.org/view.php?id=CVE-2017-3972
Infrastructure-based foot printing vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows attackers to execute arbitrary code via the server banner leaking potentially sensitive or security relevant information. Vulnerabilidad de foot printing basada en infraestructura en la interfaz web en McAfee Network Security Management (NSM), en versiones anteriores a la 8.2.7.42.2, permite que atacantes ejecuten código arbitrario mediante el banner del servidor, filtrando información potencialmente sensible o relevante para la seguridad. • https://kc.mcafee.com/corporate/index?page=content&id=SB10192 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2018-6659 – SB10228 ePO Reflected Cross-Site Scripting vulnerability
https://notcve.org/view.php?id=CVE-2018-6659
Reflected Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows remote authenticated users to exploit an XSS issue via not sanitizing the user input. Vulnerabilidad Cross-Site Scripting (XSS) reflejado en McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 y 5.9.0 permite que los usuarios autenticados remotos exploten una vulnerabilidad Cross-Site Scripting (XSS) al no sanear las entradas realizadas por un usuario. • http://www.securityfocus.com/bid/103392 http://www.securitytracker.com/id/1040884 https://kc.mcafee.com/corporate/index?page=content&id=SB10228 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-6660 – SB10228 ePO Directory Traversal vulnerability
https://notcve.org/view.php?id=CVE-2018-6660
Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file. Vulnerabilidad de salto de directorio en McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 y 5.9.0 permite que los administradores utilicen flujos de datos de Windows alternativos. Esto se podría usar para omitir las extensiones de archivo mediante una validación incorrecta de la ruta cuando se exporta un archivo XML específico. • http://www.securityfocus.com/bid/103392 http://www.securitytracker.com/id/1040884 https://kc.mcafee.com/corporate/index?page=content&id=SB10228 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2018-6661 – TS102801 True Key DLL Side-Loading vulnerability
https://notcve.org/view.php?id=CVE-2018-6661
DLL Side-Loading vulnerability in Microsoft Windows Client in McAfee True Key before 4.20.110 allows local users to gain privilege elevation via not verifying a particular DLL file signature. Vulnerabilidad de carga lateral de DLL en Microsoft Windows Client en McAfee True Key en versiones anteriores a la 4.20.110 permite que los usuarios locales obtengan una elevación de privilegios al no verificar la firma de un archivo DLL específico. This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Intel Security True Key. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the TrueKey service, which listens on TCP port 30000 by default. A crafted message to the SecureExecute method can trigger it to launch insecure binaries. • https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102801 • CWE-426: Untrusted Search Path •
CVE-2017-17740
https://notcve.org/view.php?id=CVE-2017-17740
contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation. contrib/slapd-modules/nops/nops.c en OpenLDAP hasta la versión 2.4.45, cuando el módulo nops y la capa memberof están activados, intenta liberar un búfer que se había asignado en la pila, lo que permite que los atacantes remotos provoquen una denegación de servicio (cierre inesperado de slapd) mediante una operación member MODDN. • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html http://www.openldap.org/its/index.cgi/Incoming?id=8759 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://www.oracle.com/security-alerts/cpuapr2022.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •