Show plain JSON{"id": "CVE-2011-3007", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2011-08-10T20:55:01.783", "references": [{"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-13", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/74513", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69093", "source": "cve@mitre.org"}, {"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10016", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-13", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/74513", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69093", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10016", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "The myCIOScn ActiveX control (myCIOScn.dll) in McAfee SaaS Endpoint Protection 5.2.1 and earlier allows remote attackers to write to arbitrary files by specifying an arbitrary filename in the MyCioScan.Scan.ReportFile parameter, as demonstrated by injecting script into a log file and executing arbitrary code using the MyCioScan.Scan.Start method."}, {"lang": "es", "value": "El myCIOScn control ActiveX (myCIOScn.dll) en McAfee Endpoint SaaS Protection v5.2.1 y anteriores, permite a atacantes remotos escribir en archivos arbitrarios especificando un nombre de archivo arbitrario en el par\u00e1metro MyCioScan.Scan.ReportFile, como se ha demostrado mediante la inyecci\u00f3n de secuencias de comandos en un archivo de registro y la ejecuci\u00f3n de c\u00f3digo arbitrario usando el m\u00e9todo de MyCioScan.Scan.Start."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mcafee:saas_endpoint_protection:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E4F4E19-908C-47AA-BFB3-68897247B310", "versionEndIncluding": "5.2.1"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}