Page 121 of 604 results (0.011 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in McAfee ASaP VirusScan agent 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP request. • http://www.iss.net/security_center/static/6834.php http://www.kb.cert.org/vuls/id/190267 http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=1558 http://www.osvdb.org/584 http://www.securityfocus.com/archive/1/196272 http://www.securityfocus.com/bid/3020 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q4/0073.html http://www.securityfocus.com/bid/1920 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Mcafee VirusScan 4.03 does not properly restrict access to the alert text file before it is sent to the Central Alert Server, which allows local users to modify alerts in an arbitrary fashion. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0038.html http://www.osvdb.org/6287 http://www.securityfocus.com/bid/1326 https://exchange.xforce.ibmcloud.com/vulnerabilities/4641 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

The default configurations for McAfee Virus Scan and Norton Anti-Virus virus checkers do not check files in the RECYCLED folder that is used by the Windows Recycle Bin utility, which allows attackers to store malicious code without detection. • https://www.exploit-db.com/exploits/19733 http://marc.info/?l=bugtraq&m=94936267131123&w=2 •