Summary
Detail | |||
---|---|---|---|
Vendor | Mcafee | First view | 2015-12-02 |
Product | Mcafee Enterprise Security Manager | Last view | 2015-12-02 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.3 | 2015-12-02 | CVE-2015-8024 | McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) 9.3.x before 9.3.2MR19, 9.4.x before 9.4.2MR9, and 9.5.x before 9.5.0MR8, when configured to use Active Directory or LDAP authentication sources, allow remote attackers to bypass authentication by logging in with the username "NGCP|NGCP|NGCP;" and any password. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-04-08 | Name: The remote device is affected by an authentication bypass vulnerability. File: mcafee_esm_siem_sb10137.nasl - Type: ACT_GATHER_INFO |