
CVE-2020-7292 – Web Gateway (MWG) - Inappropriate Encoding for output context
https://notcve.org/view.php?id=CVE-2020-7292
15 Jul 2020 — Inappropriate Encoding for output context vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows a remote attacker to cause MWG to return an ambiguous redirect response via getting a user to click on a malicious URL. Una Codificación Inapropiada para el contexto de salida en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite al atacante remoto causar que MWG devuelva una respuesta de redireccionamiento ambigua haciendo que un usuario haga clic en una URL maliciosa. • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-838: Inappropriate Encoding for Output Context •

CVE-2019-3638 – Web Gateway (MWG) - Reflected Cross Site Scripting vulnerability
https://notcve.org/view.php?id=CVE-2019-3638
12 Sep 2019 — Reflected Cross Site Scripting vulnerability in Administrators web console in McAfee Web Gateway (MWG) 7.8.x prior to 7.8.2.13 allows remote attackers to collect sensitive information or execute commands with the MWG administrator's credentials via tricking the administrator to click on a carefully constructed malicious link. Una vulnerabilidad de tipo Cross Site Scripting Reflejado en la consola web Administrators en McAfee Web Gateway (MWG) versiones 7.8.x anteriores a 7.8.2.13, permite a atacantes remoto... • https://kc.mcafee.com/corporate/index?page=content&id=SB10294 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-3644 – MWG scanners updated to address CVE-2019-9517
https://notcve.org/view.php?id=CVE-2019-3644
11 Sep 2019 — McAfee Web Gateway (MWG) earlier than 7.8.2.13 is vulnerable to a remote attacker exploiting CVE-2019-9517, potentially leading to a denial of service. This affects the scanning proxies. McAfee Web Gateway (MWG) versiones anteriores a 7.8.2.13, es vulnerable para un atacante remoto que explota el CVE-2019-9517, conllevando potencialmente a una denegación de servicio. Esto afecta los proxies de escaneo. • https://kc.mcafee.com/corporate/index?page=content&id=SB10296 •

CVE-2019-3643 – MWG scanners updated to address CVE-2019-9511
https://notcve.org/view.php?id=CVE-2019-3643
11 Sep 2019 — McAfee Web Gateway (MWG) earlier than 7.8.2.13 is vulnerable to a remote attacker exploiting CVE-2019-9511, potentially leading to a denial of service. This affects the scanning proxies. McAfee Web Gateway (MWG) versiones anteriores a 7.8.2.13 es vulnerable para un atacante remoto que explota el CVE-2019-9511, conllevando potencialmente a una denegación de servicio. Esto afecta a los proxies de escaneo. • https://kc.mcafee.com/corporate/index?page=content&id=SB10296 •

CVE-2019-3639 – MWG UI: Cross-Frame Scripting vulnerability
https://notcve.org/view.php?id=CVE-2019-3639
14 Aug 2019 — Clickjack vulnerability in Adminstrator web console in McAfee Web Gateway (MWG) 7.8.2.x prior to 7.8.2.12 allows remote attackers to conduct clickjacking attacks via a crafted web page that contains an iframe via does not send an X-Frame-Options HTTP header. Una vulnerabilidad de secuestro de cliqueo en la consola web Administrator en McAfee Web Gateway (MWG) versiones 7.8.2.x anteriores a 7.8.2.12, permite a los atacantes remotos conducir ataques de secuestro de cliqueo por medio de una página web diseñada... • https://kc.mcafee.com/corporate/index?page=content&id=SB10293 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVE-2019-3635 – MWG Proxy: Cross-Frame Scripting vulnerability
https://notcve.org/view.php?id=CVE-2019-3635
14 Aug 2019 — Exfiltration of Data in McAfee Web Gateway (MWG) 7.8.2.x prior to 7.8.2.12 allows attackers to obtain sensitive data via crafting a complex webpage that will trigger the Web Gateway to block the user accessing an iframe. Una exfiltración de Datos en McAfee Web Gateway (MWG) versiones 7.8.2.x anteriores a 7.8.2.12, permite a los atacantes obtener datos confidenciales mediante el diseño de una página web compleja que activará la Puerta de Enlace Web para bloquear al usuario que acceda a un iframe. • https://kc.mcafee.com/corporate/index?page=content&id=SB10293 •

CVE-2019-9511 – Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service
https://notcve.org/view.php?id=CVE-2019-9511
13 Aug 2019 — Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. Algunas implementaciones de HTTP / 2 son vulnerables a la manip... • https://github.com/flyniu666/ingress-nginx-0.21-1.19.5 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2019-9513 – Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service
https://notcve.org/view.php?id=CVE-2019-9513
13 Aug 2019 — Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU. Algunas implementaciones de HTTP / 2 son vulnerables a los bucles de recursos, lo que puede conducir a una denegación de servicio. El atacante crea múltiples flujos de solicitud y baraja continuamente la prioridad de ... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2019-9515 – Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service
https://notcve.org/view.php?id=CVE-2019-9515
13 Aug 2019 — Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. Algunas implementaciones de HTTP / 2 son vulnerables a una inundación de configuraciones, lo... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2019-9516 – Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service
https://notcve.org/view.php?id=CVE-2019-9516
13 Aug 2019 — Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory. Algunas implementaciones de HTTP / 2 son vulnerables a una fuga de encabezado, lo que puede conducir a una denega... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •