Filtered by vendor Mcafee
Subscribe
Total
604 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-3598 | 1 Mcafee | 1 Agent | 2023-11-07 | 5.0 MEDIUM | 5.3 MEDIUM |
Buffer Access with Incorrect Length Value in McAfee Agent (MA) 5.x allows remote unauthenticated users to potentially cause a denial of service via specifically crafted UDP packets. | |||||
CVE-2019-3585 | 1 Mcafee | 1 Virusscan Enterprise | 2023-11-07 | 7.2 HIGH | 7.8 HIGH |
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow local users to interact with the On-Access Scan Messages - Threat Alert Window with elevated privileges via running McAfee Tray with elevated privileges. | |||||
CVE-2019-3599 | 1 Mcafee | 1 Agent | 2023-11-07 | 4.3 MEDIUM | 7.5 HIGH |
Information Disclosure vulnerability in Remote logging (which is disabled by default) in McAfee Agent (MA) 5.x allows remote unauthenticated users to access sensitive information via remote logging when it is enabled. | |||||
CVE-2019-3584 | 1 Mcafee | 1 Mvision Endpoint | 2023-11-07 | 3.6 LOW | 6.0 MEDIUM |
Exploitation of Authentication vulnerability in MVision Endpoint in McAfee MVision Endpoint Prior to 1811 Update 1 (18.11.31.62) allows authenticated administrator users --> administrators to Remove MVision Endpoint via unspecified vectors. | |||||
CVE-2019-3604 | 1 Mcafee | 1 Epolicy Orchestrator | 2023-11-07 | 6.8 MEDIUM | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in McAfee ePO (legacy) Cloud allows unauthenticated users to perform unintended ePO actions using an authenticated user's session via unspecified vectors. | |||||
CVE-2019-3606 | 1 Mcafee | 1 Network Security Manager | 2023-11-07 | 1.9 LOW | 4.1 MEDIUM |
Data Leakage Attacks vulnerability in the web portal component when in an MDR pair in McAfee Network Security Management (NSM) 9.1 < 9.1.7.75 (Update 4) and 9.2 < 9.2.7.31 Update2 allows administrators to view configuration information in plain text format via the GUI or GUI terminal commands. | |||||
CVE-2019-1559 | 13 Canonical, Debian, F5 and 10 more | 90 Ubuntu Linux, Debian Linux, Big-ip Access Policy Manager and 87 more | 2023-11-07 | 4.3 MEDIUM | 5.9 MEDIUM |
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q). | |||||
CVE-2019-16168 | 8 Canonical, Debian, Fedoraproject and 5 more | 20 Ubuntu Linux, Debian Linux, Fedora and 17 more | 2023-11-07 | 4.3 MEDIUM | 6.5 MEDIUM |
In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner." | |||||
CVE-2018-6683 | 2 Mcafee, Microsoft | 2 Data Loss Prevention Endpoint, Windows | 2023-11-07 | 4.6 MEDIUM | 7.4 HIGH |
Exploiting Incorrectly Configured Access Control Security Levels vulnerability in McAfee Data Loss Prevention (DLP) for Windows versions prior to 10.0.505 and 11.0.405 allows local users to bypass DLP policy via editing of local policy files when offline. | |||||
CVE-2018-6667 | 1 Mcafee | 1 Mcafee Web Gateway | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Authentication Bypass vulnerability in the administrative user interface in McAfee Web Gateway 7.8.1.0 through 7.8.1.5 allows remote attackers to execute arbitrary code via Java management extensions (JMX). | |||||
CVE-2018-6661 | 2 Mcafee, Microsoft | 2 True Key, Windows | 2023-11-07 | 6.8 MEDIUM | 7.8 HIGH |
DLL Side-Loading vulnerability in Microsoft Windows Client in McAfee True Key before 4.20.110 allows local users to gain privilege elevation via not verifying a particular DLL file signature. | |||||
CVE-2018-6703 | 1 Mcafee | 1 Agent | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Use After Free in Remote logging (which is disabled by default) in McAfee McAfee Agent (MA) 5.x prior to 5.6.0 allows remote unauthenticated attackers to cause a Denial of Service and potentially a remote code execution via a specially crafted HTTP header sent to the logging service. | |||||
CVE-2018-6695 | 1 Mcafee | 1 Threat Intelligence Exchange Server | 2023-11-07 | 4.3 MEDIUM | 5.9 MEDIUM |
SSH host keys generation vulnerability in the server in McAfee Threat Intelligence Exchange Server (TIE Server) 1.3.0, 2.0.x, 2.1.x, 2.2.0 allows man-in-the-middle attackers to spoof servers via acquiring keys from another environment. | |||||
CVE-2018-6678 | 1 Mcafee | 1 Mcafee Web Gateway | 2023-11-07 | 6.5 MEDIUM | 9.1 CRITICAL |
Configuration/Environment manipulation vulnerability in the administrative interface in McAfee Web Gateway (MWG) MWG 7.8.1.x allows authenticated administrator users to execute arbitrary commands via unspecified vectors. | |||||
CVE-2018-6756 | 2 Mcafee, Microsoft | 2 True Key, Windows | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
Authentication Abuse vulnerability in Microsoft Windows client in McAfee True Key (TK) 5.1.230.7 and earlier allows local users to execute unauthorized commands via specially crafted malware. | |||||
CVE-2018-6668 | 1 Mcafee | 1 Application Change Control | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
A whitelist bypass vulnerability in McAfee Application Control / Change Control 7.0.1 and before allows execution bypass, for example, with simple DLL through interpreters such as PowerShell. | |||||
CVE-2018-6677 | 1 Mcafee | 1 Mcafee Web Gateway | 2023-11-07 | 9.0 HIGH | 9.1 CRITICAL |
Directory Traversal vulnerability in the administrative user interface in McAfee Web Gateway (MWG) MWG 7.8.1.x allows authenticated administrator users to gain elevated privileges via unspecified vectors. | |||||
CVE-2018-6682 | 1 Mcafee | 1 True Key | 2023-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross Site Scripting Exposure in McAfee True Key (TK) 4.0.0.0 and earlier allows local users to expose confidential data via a crafted web site. | |||||
CVE-2018-6681 | 1 Mcafee | 1 Network Security Manager | 2023-11-07 | 3.5 LOW | 5.4 MEDIUM |
Abuse of Functionality vulnerability in the web interface in McAfee Network Security Management (NSM) 9.1.7.11 and earlier allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via appliance web interface. | |||||
CVE-2018-6707 | 1 Mcafee | 1 Agent | 2023-11-07 | 4.4 MEDIUM | 7.0 HIGH |
Denial of Service through Resource Depletion vulnerability in the agent in non-Windows McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to cause DoS, unexpected behavior, or potentially unauthorized code execution via knowledge of the internal trust mechanism. |