4 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Untrusted search path vulnerability in McAfee VirusScan for Linux 4510e and earlier includes the current working directory in the DT_RPATH environment variable, which allows local users to load arbitrary ELF DSO libraries and execute arbitrary code by installing malicious libraries in that directory. Vulnerabilidad de ruta de búsqueda no confiable en McAfee VirusScan para Linux 4510e y versiones anteriores, incluye el directorio de trabajo actual en la variable de entorno DT_RPATH, que permite a usuarios locales cargar bibliotecas ELF DSO de su elección y ejecutar código de su elección instalando bibliotecas maliciosas en ese directorio. • http://secunia.com/advisories/23278 http://secunia.com/advisories/23429 http://security.gentoo.org/glsa/glsa-200612-15.xml http://securitytracker.com/id?1017385 http://www.securityfocus.com/bid/21592 http://www.vupen.com/english/advisories/2006/5023 https://exchange.xforce.ibmcloud.com/vulnerabilities/30898 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

McAfee VirusScan 4.5.1 does not drop SYSTEM privileges before allowing users to browse for files via the "System Scan" properties of the System Tray applet, which could allow local users to gain privileges. • http://marc.info/?l=bugtraq&m=109526269429728&w=2 http://www.idefense.com/application/poi/display?id=140&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/17367 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q4/0073.html http://www.securityfocus.com/bid/1920 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

The default installation of VirusScan 4.5 and NetShield 4.5 has insecure permissions for the registry key that identifies the AutoUpgrade directory, which allows local users to execute arbitrary commands by replacing SETUP.EXE in that directory with a Trojan Horse. • http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0007&L=ntbugtraq&F=&S=&P=2753 http://www.osvdb.org/1458 http://www.osvdb.org/4200 http://www.securityfocus.com/bid/1458 https://exchange.xforce.ibmcloud.com/vulnerabilities/5177 •