Language:
https://www.securityfocus.com/archive/1/522835
https://www.zerodayinitiative.com/advisories/ZDI-12-116/
https://www.zerodayinitiative.com/advisories/ZDI-12-117/
https://www.zerodayinitiative.com/advisories/ZDI-12-118/
https://www.zerodayinitiative.com/advisories/ZDI-12-119/
https://www.zerodayinitiative.com/advisories/ZDI-12-120/
https://www.zerodayinitiative.com/advisories/ZDI-12-121/
https://www.zerodayinitiative.com/advisories/ZDI-12-122/
https://www.zerodayinitiative.com/advisories/ZDI-12-123/
https://www.zerodayinitiative.com/advisories/ZDI-12-124/
https://www.zerodayinitiative.com/advisories/ZDI-12-159/
https://www.zerodayinitiative.com/advisories/ZDI-12-160/
https://www.zerodayinitiative.com/advisories/ZDI-12-161/
https://seclists.org/fulldisclosure/2012/Aug/281
Severity: High
ID: 61491
File Name: emc_autostart_ftagent_esa-2012-020.nasl
Version: 1.10
Type: remote
Family: Gain a shell remotely
Published: 8/10/2012
Updated: 4/11/2022
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2012-0409
CPE: cpe:/a:emc:autostart
Required KB Items: emc/autostart/ftagent/version
Exploit Ease: No known exploits are available
Patch Publication Date: 7/12/2012
Vulnerability Publication Date: 5/24/2012
CVE: CVE-2012-0409
BID: 53682