{"api_version":"1","generated_at":"2026-04-26T03:11:40+00:00","cve":"CVE-2011-3007","urls":{"html":"https://cve.report/CVE-2011-3007","api":"https://cve.report/api/cve/CVE-2011-3007.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2011-3007","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2011-3007"},"summary":{"title":"CVE-2011-3007","description":"The myCIOScn ActiveX control (myCIOScn.dll) in McAfee SaaS Endpoint Protection 5.2.1 and earlier allows remote attackers to write to arbitrary files by specifying an arbitrary filename in the MyCioScan.Scan.ReportFile parameter, as demonstrated by injecting script into a log file and executing arbitrary code using the MyCioScan.Scan.Start method.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2011-08-10 20:55:00","updated_at":"2017-08-29 01:29:00"},"problem_types":["CWE-94"],"metrics":[],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/69093","name":"mcafee-saas-mycioscn-code-execution(69093)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://dvlabs.tippingpoint.com/advisory/TPTI-11-13","name":"http://dvlabs.tippingpoint.com/advisory/TPTI-11-13","refsource":"MISC","tags":[],"title":"TippingPoint | DVLabs |","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10016","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10016","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"McAfee KnowledgeBase - McAfee Security Bulletin - McAfee SaaS Endpoint Protection update fixes multiple ActiveX issues","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/74513","name":"74513","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2011-3007","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-3007","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2011","cve_id":"3007","vulnerable":"1","versionEndIncluding":"5.2.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"saas_endpoint_protection","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2011-3007","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The myCIOScn ActiveX control (myCIOScn.dll) in McAfee SaaS Endpoint Protection 5.2.1 and earlier allows remote attackers to write to arbitrary files by specifying an arbitrary filename in the MyCioScan.Scan.ReportFile parameter, as demonstrated by injecting script into a log file and executing arbitrary code using the MyCioScan.Scan.Start method."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10016","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10016"},{"name":"mcafee-saas-mycioscn-code-execution(69093)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/69093"},{"name":"74513","refsource":"OSVDB","url":"http://osvdb.org/74513"},{"name":"http://dvlabs.tippingpoint.com/advisory/TPTI-11-13","refsource":"MISC","url":"http://dvlabs.tippingpoint.com/advisory/TPTI-11-13"}]}},"nvd":{"publishedDate":"2011-08-10 20:55:00","lastModifiedDate":"2017-08-29 01:29:00","problem_types":["CWE-94"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mcafee:saas_endpoint_protection:*:*:*:*:*:*:*:*","versionEndIncluding":"5.2.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2011","CveId":"3007","Ordinal":"50225","Title":"CVE-2011-3007","CVE":"CVE-2011-3007","Year":"2011"},"notes":[{"CveYear":"2011","CveId":"3007","Ordinal":"1","NoteData":"The myCIOScn ActiveX control (myCIOScn.dll) in McAfee SaaS Endpoint Protection 5.2.1 and earlier allows remote attackers to write to arbitrary files by specifying an arbitrary filename in the MyCioScan.Scan.ReportFile parameter, as demonstrated by injecting script into a log file and executing arbitrary code using the MyCioScan.Scan.Start method.","Type":"Description","Title":null},{"CveYear":"2011","CveId":"3007","Ordinal":"2","NoteData":"2011-08-10","Type":"Other","Title":"Published"},{"CveYear":"2011","CveId":"3007","Ordinal":"3","NoteData":"2017-08-28","Type":"Other","Title":"Modified"}]}}}