Page 2 of 10 results (0.006 seconds)

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user to delete or download protected log data via improper access controls in the user interface. Una vulnerabilidad de Escalada de Privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite a un usuario autenticado de la interfaz de usuario eliminar o descargar datos de registro protegidos por medio de controles de acceso inapropiados en la interfaz de usuario • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-287: Improper Authentication •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user to delete or download protected files via improper access controls in the REST interface. Una vulnerabilidad de Escalada de Privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite a un usuario autenticado de la interfaz de usuario eliminar o descargar archivos protegidos por medio de controles de acceso inapropiados en la interfaz REST • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user with low permissions to change the system's root password via improper access controls in the user interface. Una vulnerabilidad de Escalada de Privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite a usuarios de la interfaz de usuario autenticados con permisos bajos cambiar la contraseña root del sistema por medio de controles de acceso inapropiados en la interfaz de usuario • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Inappropriate Encoding for output context vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows a remote attacker to cause MWG to return an ambiguous redirect response via getting a user to click on a malicious URL. Una Codificación Inapropiada para el contexto de salida en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite al atacante remoto causar que MWG devuelva una respuesta de redireccionamiento ambigua haciendo que un usuario haga clic en una URL maliciosa. • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-838: Inappropriate Encoding for Output Context •

CVSS: 5.9EPSS: 1%CPEs: 180EXPL: 0

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). • http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00080.html http://www.securityfocus.com/bid/107174 https://access. • CWE-203: Observable Discrepancy CWE-325: Missing Cryptographic Step •