{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T14:41:49.407","vulnerabilities":[{"cve":{"id":"CVE-2018-6660","sourceIdentifier":"trellixpsirt@trellix.com","published":"2018-04-02T13:29:00.280","lastModified":"2024-11-21T04:11:04.330","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 y 5.9.0 permite que los administradores utilicen flujos de datos de Windows alternativos. Esto se podría usar para omitir las extensiones de archivo mediante una validación incorrecta de la ruta cuando se exporta un archivo XML específico."}],"metrics":{"cvssMetricV30":[{"source":"trellixpsirt@trellix.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H","baseScore":6.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.0:*:*:*:*:*:*:*","matchCriteriaId":"5F3977FF-A202-4679-B848-ED1B3A1C98A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"3D0E33E0-5B8F-4448-A5F3-5AE901AC8774"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.3.2:*:*:*:*:*:*:*","matchCriteriaId":"E9220E40-8664-4DB3-AF96-802F8CDEC58A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","matchCriteriaId":"DEB90C24-D252-4099-A7A1-9F8754DFB4A5"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/103392","source":"trellixpsirt@trellix.com"},{"url":"http://www.securitytracker.com/id/1040884","source":"trellixpsirt@trellix.com"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10228","source":"trellixpsirt@trellix.com"},{"url":"http://www.securityfocus.com/bid/103392","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1040884","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10228","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}