Filtered by vendor Mcafee
Subscriptions
Filtered by product Epolicy Orchestrator
Subscriptions
Total
86 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2018-6660 | 1 Mcafee | 1 Epolicy Orchestrator | 2024-11-21 | N/A |
Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file. | ||||
CVE-2018-6659 | 1 Mcafee | 1 Epolicy Orchestrator | 2024-11-21 | N/A |
Reflected Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows remote authenticated users to exploit an XSS issue via not sanitizing the user input. | ||||
CVE-2017-3980 | 1 Mcafee | 1 Epolicy Orchestrator | 2024-11-21 | N/A |
A directory traversal vulnerability in the ePO Extension in McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, and 5.1.3 and earlier allows remote authenticated users to execute a command of their choice via an authenticated ePO session. | ||||
CVE-2017-3936 | 1 Mcafee | 1 Epolicy Orchestrator | 2024-11-21 | N/A |
OS Command Injection vulnerability in McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, 5.3.1, 5.1.3, 5.1.2, 5.1.1, and 5.1.0 allows attackers to run arbitrary OS commands with limited privileges via not sanitizing the user input data before exporting it into a CSV format output. | ||||
CVE-2017-3902 | 1 Mcafee | 1 Epolicy Orchestrator | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in the Web user interface (UI) in Intel Security ePO 5.1.3, 5.1.2, 5.1.1, and 5.1.0 allows authenticated users to inject malicious Java scripts via bypassing input validation. | ||||
CVE-2016-8027 | 1 Mcafee | 1 Epolicy Orchestrator | 2024-11-21 | N/A |
SQL injection vulnerability in core services in Intel Security McAfee ePolicy Orchestrator (ePO) 5.3.2 and earlier and 5.1.3 and earlier allows attackers to alter a SQL query, which can result in disclosure of information within the database or impersonation of an agent without authentication via a specially crafted HTTP post. |