Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2013-0140

Disclosure Date: May 01, 2013 (last updated October 05, 2023)
SQL injection vulnerability in the Agent-Handler component in McAfee ePolicy Orchestrator (ePO) before 4.5.7 and 4.6.x before 4.6.6 allows remote attackers to execute arbitrary SQL commands via a crafted request over the Agent-Server communication channel.
0
Attacker Value
Unknown

CVE-2013-0141

Disclosure Date: May 01, 2013 (last updated October 05, 2023)
Directory traversal vulnerability in McAfee ePolicy Orchestrator (ePO) before 4.5.7 and 4.6.x before 4.6.6 allows remote attackers to upload arbitrary files via a crafted request over the Agent-Server communication channel, as demonstrated by writing to the Software/ directory.
0
Attacker Value
Unknown

CVE-2012-4594

Disclosure Date: August 22, 2012 (last updated October 04, 2023)
McAfee ePolicy Orchestrator (ePO) 4.6.1 and earlier allows remote authenticated users to bypass intended access restrictions, and obtain sensitive information from arbitrary reporting panels, via a modified ID value in a console URL.
0
Attacker Value
Unknown

CVE-2003-0149

Disclosure Date: August 27, 2003 (last updated February 22, 2025)
Heap-based buffer overflow in ePO agent for McAfee ePolicy Orchestrator 2.0, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code via a POST request containing long parameters.
0
Attacker Value
Unknown

CVE-2003-0616

Disclosure Date: August 27, 2003 (last updated February 22, 2025)
Format string vulnerability in ePO service for McAfee ePolicy Orchestrator 2.0, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code via a POST request with format strings in the computerlist parameter, which are used when logging a failed name resolution.
0
Attacker Value
Unknown

CVE-2003-0148

Disclosure Date: August 27, 2003 (last updated February 22, 2025)
The default installation of MSDE via McAfee ePolicy Orchestrator 2.0 through 3.0 allows attackers to execute arbitrary code via a series of steps that (1) obtain the database administrator username and encrypted password in a configuration file from the ePO server using a certain request, (2) crack the password due to weak cryptography, and (3) use the password to pass commands through xp_cmdshell.
0