Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2013-0140
Disclosure Date: May 01, 2013 (last updated October 05, 2023)
SQL injection vulnerability in the Agent-Handler component in McAfee ePolicy Orchestrator (ePO) before 4.5.7 and 4.6.x before 4.6.6 allows remote attackers to execute arbitrary SQL commands via a crafted request over the Agent-Server communication channel.
0
Attacker Value
Unknown
CVE-2013-0141
Disclosure Date: May 01, 2013 (last updated October 05, 2023)
Directory traversal vulnerability in McAfee ePolicy Orchestrator (ePO) before 4.5.7 and 4.6.x before 4.6.6 allows remote attackers to upload arbitrary files via a crafted request over the Agent-Server communication channel, as demonstrated by writing to the Software/ directory.
0
Attacker Value
Unknown
CVE-2012-4594
Disclosure Date: August 22, 2012 (last updated October 04, 2023)
McAfee ePolicy Orchestrator (ePO) 4.6.1 and earlier allows remote authenticated users to bypass intended access restrictions, and obtain sensitive information from arbitrary reporting panels, via a modified ID value in a console URL.
0
Attacker Value
Unknown
CVE-2003-0149
Disclosure Date: August 27, 2003 (last updated February 22, 2025)
Heap-based buffer overflow in ePO agent for McAfee ePolicy Orchestrator 2.0, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code via a POST request containing long parameters.
0
Attacker Value
Unknown
CVE-2003-0616
Disclosure Date: August 27, 2003 (last updated February 22, 2025)
Format string vulnerability in ePO service for McAfee ePolicy Orchestrator 2.0, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code via a POST request with format strings in the computerlist parameter, which are used when logging a failed name resolution.
0
Attacker Value
Unknown
CVE-2003-0148
Disclosure Date: August 27, 2003 (last updated February 22, 2025)
The default installation of MSDE via McAfee ePolicy Orchestrator 2.0 through 3.0 allows attackers to execute arbitrary code via a series of steps that (1) obtain the database administrator username and encrypted password in a configuration file from the ePO server using a certain request, (2) crack the password due to weak cryptography, and (3) use the password to pass commands through xp_cmdshell.
0