Filtered by vendor Mcafee
Subscribe
Total
604 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-6693 | 2 Linux, Mcafee | 3 Linux Kernel, Endpoint Security For Linux Threat Prevention, Endpoint Security Linux Threat Prevention | 2023-11-07 | 3.3 LOW | 5.3 MEDIUM |
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escalation to delete arbitrary files. | |||||
CVE-2018-6669 | 1 Mcafee | 1 Application Change Control | 2023-11-07 | 5.2 MEDIUM | 8.0 HIGH |
A whitelist bypass vulnerability in McAfee Application Control / Change Control 7.0.1 and before allows a remote or local user to execute blacklisted files through an ASP.NET form. | |||||
CVE-2018-6686 | 1 Mcafee | 1 Drive Encryption | 2023-11-07 | 4.6 MEDIUM | 6.6 MEDIUM |
Authentication Bypass vulnerability in TPM autoboot in McAfee Drive Encryption (MDE) 7.1.0 and above allows physically proximate attackers to bypass local security protection via specific set of circumstances. | |||||
CVE-2018-6706 | 1 Mcafee | 1 Agent | 2023-11-07 | 5.0 MEDIUM | 7.5 HIGH |
Insecure handling of temporary files in non-Windows McAfee Agent 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows an Unprivileged User to introduce custom paths during agent installation in Linux via unspecified vectors. | |||||
CVE-2018-6672 | 1 Mcafee | 1 Epolicy Orchestrator | 2023-11-07 | 4.0 MEDIUM | 6.5 MEDIUM |
Information disclosure vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows authenticated users to view sensitive information in plain text format via unspecified vectors. | |||||
CVE-2018-6687 | 2 Mcafee, Microsoft | 2 Getsusp, Windows | 2023-11-07 | 4.3 MEDIUM | 5.5 MEDIUM |
Loop with Unreachable Exit Condition ('Infinite Loop') in McAfee GetSusp (GetSusp) 3.0.0.461 and earlier allows attackers to DoS a manual GetSusp scan via while scanning a specifically crafted file . GetSusp is a free standalone McAfee tool that runs on several versions of Microsoft Windows. | |||||
CVE-2018-6700 | 1 Mcafee | 1 True Key | 2023-11-07 | 6.8 MEDIUM | 7.8 HIGH |
DLL Search Order Hijacking vulnerability in Microsoft Windows Client in McAfee True Key (TK) before 5.1.165 allows local users to execute arbitrary code via specially crafted malware. | |||||
CVE-2018-6664 | 2 Mcafee, Microsoft | 2 Data Loss Prevention Endpoint, Windows | 2023-11-07 | 6.5 MEDIUM | 8.8 HIGH |
Application Protections Bypass vulnerability in Microsoft Windows in McAfee Data Loss Prevention (DLP) Endpoint before 10.0.500 and DLP Endpoint before 11.0.400 allows authenticated users to bypass the product block action via a command-line utility. | |||||
CVE-2018-6690 | 2 Mcafee, Microsoft | 2 Application Change Control, Windows | 2023-11-07 | 3.6 LOW | 7.1 HIGH |
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system. | |||||
CVE-2018-6670 | 1 Mcafee | 1 Common Catalog | 2023-11-07 | 4.0 MEDIUM | 6.5 MEDIUM |
External Entity Attack vulnerability in the ePO extension in McAfee Common UI (CUI) 2.0.2 allows remote authenticated users to view confidential information via a crafted HTTP request parameter. | |||||
CVE-2018-6659 | 1 Mcafee | 1 Epolicy Orchestrator | 2023-11-07 | 3.5 LOW | 5.4 MEDIUM |
Reflected Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows remote authenticated users to exploit an XSS issue via not sanitizing the user input. | |||||
CVE-2018-6704 | 1 Mcafee | 1 Agent | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions. | |||||
CVE-2018-6755 | 2 Mcafee, Microsoft | 2 True Key, Windows | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
Weak Directory Permission Vulnerability in Microsoft Windows client in McAfee True Key (TK) 5.1.230.7 and earlier allows local users to execute arbitrary code via specially crafted malware. | |||||
CVE-2018-6674 | 2 Mcafee, Microsoft | 2 Virusscan Enterprise, Windows | 2023-11-07 | 2.1 LOW | 3.9 LOW |
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 13 allows local users to spawn unrelated processes with elevated privileges via the system administrator granting McTray.exe elevated privileges (by default it runs with the current user's privileges). | |||||
CVE-2018-6757 | 2 Mcafee, Microsoft | 2 True Key, Windows | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
Privilege Escalation vulnerability in Microsoft Windows client in McAfee True Key (TK) 5.1.230.7 and earlier allows local users to execute arbitrary code via specially crafted malware. | |||||
CVE-2018-6660 | 1 Mcafee | 1 Epolicy Orchestrator | 2023-11-07 | 4.0 MEDIUM | 4.9 MEDIUM |
Directory Traversal vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.2, 5.3.1, 5.3.0 and 5.9.0 allows administrators to use Windows alternate data streams, which could be used to bypass the file extensions, via not properly validating the path when exporting a particular XML file. | |||||
CVE-2018-6662 | 2 Apple, Mcafee | 2 Mac Os X, Management Of Native Encryption | 2023-11-07 | 7.2 HIGH | 7.8 HIGH |
Privilege Escalation vulnerability in McAfee Management of Native Encryption (MNE) before 4.1.4 allows local users to gain elevated privileges via a crafted user input. | |||||
CVE-2018-6689 | 1 Mcafee | 1 Data Loss Prevention Endpoint | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
Authentication Bypass vulnerability in McAfee Data Loss Prevention Endpoint (DLPe) 10.0.x earlier than 10.0.510, and 11.0.x earlier than 11.0.600 allows attackers to bypass local security protection via specific conditions. | |||||
CVE-2018-6671 | 1 Mcafee | 1 Epolicy Orchestrator | 2023-11-07 | 4.0 MEDIUM | 6.5 MEDIUM |
Application Protection Bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request. | |||||
CVE-2018-6705 | 1 Mcafee | 1 Agent | 2023-11-07 | 4.6 MEDIUM | 7.8 HIGH |
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions. |