Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-8800

EPSS 0.40% · P61
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-8800

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Symantec Embedded Security: Critical System Protection (SES:CSP) 1.0.x before 1.0 MP5, Embedded Security: Critical System Protection for Controllers and Devices (SES:CSP) 6.5.0 before MP1, Critical System Protection (SCSP) before 5.2.9 MP6, Data Center Security: Server Advanced Server (DCS:SA) 6.x before 6.5 MP1 and 6.6 before MP1, and Data Center Security: Server Advanced Server and Agents (DCS:SA) through 6.6 MP1 allow remote authenticated users to conduct argument-injection attacks by leveraging certain named-pipe access.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Symantec Embedded Security:Critical System Protection和Symantec Data Center Security: Server Advanced 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Symantec Embedded Security:Critical System Protection(SES:CSP)和Symantec Data Center Security: Server Advanced(SDCS:SA)都是美国赛门铁克(Symantec)公司的安全产品。SES:CSP是一款轻量级的入侵检测和防御系统客户端产品;SDCS:SA为软件定义数据中心的物理和虚拟服务器提供了安全防护。 SES:CSP和SDCS:SA中存在安全漏洞。远程攻击者可利用该漏洞以‘命名管道写入/读取权限’
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-8800

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-8800

Please Login to view more intelligence information

Same Patch Batch · n/a · 2016-06-08 · 40 CVEs total

CVE-2016-4361HPE LoadRunner和Performance Center 安全漏洞
CVE-2016-2027HPE Matrix Operating Environment 安全漏洞
CVE-2016-2028HPE Matrix Operating Environment 安全漏洞
CVE-2016-2029HPE Matrix Operating Environment 安全漏洞
CVE-2016-2030HPE Matrix Operating Environment 安全漏洞
CVE-2016-2078VMware vCenter Server 跨站脚本漏洞
CVE-2016-4357HPE Matrix Operating Environment 安全漏洞
CVE-2016-4358HPE Matrix Operating Environment 安全漏洞
CVE-2016-4359HPE LoadRunner和Performance Center 安全漏洞
CVE-2016-4360HPE LoadRunner和Performance Center 安全漏洞
CVE-2016-2026HPE Matrix Operating Environment 安全漏洞
CVE-2016-4362HPE Insight Control server deployment 安全漏洞
CVE-2016-4363HPE Insight Control server deployment 安全漏洞
CVE-2016-4364HPE Insight Control server deployment 安全漏洞
CVE-2016-4365HPE Insight Control server deployment 安全漏洞
CVE-2016-4366HPE Systems Insight Manager 远程安全漏洞
CVE-2016-4367HPE Universal CMDB Universal Discovery组件信息泄露漏洞
CVE-2016-4368多款HPE产品输入验证漏洞
CVE-2016-4369HPE Discovery and Dependency Mapping Inventory 任意命令执行漏洞
CVE-2016-5108VideoLAN VLC Media Player 缓冲区溢出漏洞

Showing top 20 of 40 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2015-8800

No comments yet


Leave a comment