cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2012-4599,https://securityvulnerability.io/vulnerability/CVE-2012-4599,,"McAfee SmartFilter Administration, and SmartFilter Administration Bess Edition, before 4.2.1.01 does not require authentication for access to the JBoss Remote Method Invocation (RMI) interface, which allows remote attackers to execute arbitrary code via a crafted .war file.",Mcafee,Smartfilter Administration,,,0.0066200001165270805,false,,false,false,false,,,false,false,,2012-08-22T10:00:00.000Z,0 CVE-2009-2429,https://securityvulnerability.io/vulnerability/CVE-2009-2429,,"SmartFilter Web Gateway Security 4.2.1.00 stores user credentials in cleartext in admin_backup.xml files and uses insecure permissions for these files, which allows local users to gain privileges. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",Mcafee,Smartfilter,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2009-07-10T17:00:00.000Z,0 CVE-2009-2312,https://securityvulnerability.io/vulnerability/CVE-2009-2312,,"SmartFilter Web Gateway Security 4.2.1.00 stores user credentials in cleartext in config.txt and uses insecure permissions for this file, which allows local users to gain privileges.",Mcafee,Smartfilter,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2009-07-02T10:00:00.000Z,0