Page 115 of 604 results (0.006 seconds)

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

Multiple interpretation error in unspecified versions of McAfee Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. • http://marc.info/?l=bugtraq&m=112879611919750&w=2 http://shadock.net/secubox/AVCraftedArchive.html •

CVSS: 1.9EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in McAfee IntruShield Security Management System allow remote authenticated users to inject arbitrary web script or HTML via the (1) thirdMenuName or (2) resourceName parameter to SystemEvent.jsp. • http://marc.info/?l=bugtraq&m=112066594312876&w=2 http://marc.info/?l=bugtraq&m=112076813804503&w=2 http://secunia.com/advisories/15961 http://securitytracker.com/id?1014422 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

McAfee IntruShield Security Management System allows remote authenticated users to access the "Generate Reports" feature and modify alerts by setting the Access option to true, as demonstrated using the (1) fullAccess or (2) fullAccessRight parameter in reports-column-center.jsp, or (3) fullAccess parameter to SystemEvent.jsp. • http://marc.info/?l=bugtraq&m=112066594312876&w=2 http://marc.info/?l=bugtraq&m=112076813804503&w=2 http://secunia.com/advisories/15961 http://securitytracker.com/id?1014422 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

McAfee IntruShield Security Management System obtains the user ID from the URL, which allows remote attackers to guess the Manager account and possibly gain privileges via a brute force attack. • http://marc.info/?l=bugtraq&m=112066594312876&w=2 http://marc.info/?l=bugtraq&m=112076813804503&w=2 http://securitytracker.com/id?1014422 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

McAfee Internet Security Suite 2005 uses insecure default ACLs for installed files, which allows local users to gain privileges or disable protection by modifying certain files. • http://www.idefense.com/application/poi/display?id=233&type=vulnerabilities •