5 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 12EXPL: 0

McAfee Common Management Agent (CMA) 3.5.5 through 3.5.5.588 and 3.6.0 through 3.6.0.608, and McAfee Agent 4.0 before Patch 3, allows remote authenticated users to overwrite arbitrary files by accessing a report-writing ActiveX control COM object. McAfee Common Management Agent (CMA) v3.5.5 hasta v3.5.5.588 y v3.6.0 hasta v3.6.0.608, y McAfee Agent v4.0 anteriores a Patch 3, permite a usuarios remotos autentificados a sobreescribir ficheros accediendo al objeto COM que es un control ActiveX (report-writing ). • https://exchange.xforce.ibmcloud.com/vulnerabilities/78446 https://kc.mcafee.com/corporate/index?page=content&id=SB10002 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 49%CPEs: 6EXPL: 0

Stack-based buffer overflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.6.0.453 and earlier allows remote attackers to execute arbitrary code via a crafted ping packet. Desbordamiento de búfer basado en pila en McAfee ePolicy Orchestrator 3.5 hasta 3.6.1, ProtectionPilot 1.1.1 y 1.5, y Common Management Agent (CMA) 3.6.0.453 y anteriores permiten a atacantes remotos ejecutar código de su elección mediante un paquete ping artesanal. • http://secunia.com/advisories/26029 http://www.iss.net/threats/269.html http://www.osvdb.org/36099 http://www.securityfocus.com/bid/24863 http://www.securitytracker.com/id?1018363 http://www.vupen.com/english/advisories/2007/2498 https://exchange.xforce.ibmcloud.com/vulnerabilities/31163 https://knowledge.mcafee.com/article/762/613365_f.SAL_Public.html •

CVSS: 7.6EPSS: 11%CPEs: 7EXPL: 0

Heap-based buffer overflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.5.5.438 through 3.6.0.453 allows remote attackers to execute arbitrary code via a crafted packet. Desbordamiento de búfer basado en pila en McAfee ePolicy Orchestrator 3.5 hasta 3.6.1, ProtectionPilot 1.1.1 y 1.5, y Common Management Agent (CMA) 3.5.5.438 hasta 3.6.0.453 permite a atacantes remotos ejecutar código de su elección mediante un paquete artesanal. • http://secunia.com/advisories/26029 http://www.iss.net/threats/269.html http://www.nessus.org/plugins/index.php?view=single&id=25702 http://www.osvdb.org/36100 http://www.securityfocus.com/bid/24863 http://www.securitytracker.com/id?1018363 http://www.vupen.com/english/advisories/2007/2498 https://exchange.xforce.ibmcloud.com/vulnerabilities/31164 https://knowledge.mcafee.com/article/763/613366_f.SAL_Public.html •

CVSS: 7.6EPSS: 3%CPEs: 6EXPL: 0

Integer overflow in McAfee ePolicy Orchestrator 3.5 through 3.6.1, ProtectionPilot 1.1.1 and 1.5, and Common Management Agent (CMA) 3.5.5.438 allows remote attackers to cause a denial of service (CMA Framework service crash) and possibly execute arbitrary code via unspecified vectors. Desbordamiento de entero en McAfee ePolicy Orchestrator 3.5 hasta 3.6.1, ProtectionPilot 1.1.1 y 1.5, y Common Management Agent (CMA) 3.5.5.438 permite a atacantes remotos provocar una denegación de servicio (caída del servicio CMA Framework) y posiblemente ejecutar código de su elección mediante vectores no especificados. • http://secunia.com/advisories/26029 http://www.iss.net/threats/269.html http://www.osvdb.org/36101 http://www.securityfocus.com/bid/24863 http://www.securitytracker.com/id?1018363 http://www.vupen.com/english/advisories/2007/2498 https://exchange.xforce.ibmcloud.com/vulnerabilities/31165 https://knowledge.mcafee.com/article/764/613367_f.SAL_Public.html •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

Unquoted Windows search path vulnerability in McAfee VirusScan Enterprise 8.0i (patch 11) and CMA 3.5 (patch 5) might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run by naPrdMgr.exe when it attempts to execute EntVUtil.EXE under an unquoted "Program Files" path. • https://www.exploit-db.com/exploits/26970 http://reedarvin.thearvins.com/20051222-01.html http://securityreason.com/securityalert/292 http://securitytracker.com/id?1015404 http://www.securityfocus.com/archive/1/420104/100/0/threaded http://www.securityfocus.com/bid/16040 http://www.vupen.com/english/advisories/2005/3077 https://exchange.xforce.ibmcloud.com/vulnerabilities/23815 •