Page 33 of 604 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow local users to interact with the On-Access Scan Messages - Threat Alert Window with elevated privileges via running McAfee Tray with elevated privileges. Una vulnerabilidad de Escalada de Privilegios en el cliente (McTray.exe) de Microsoft Windows en McAfee VirusScan Enterprise (VSE) versión 8.8 anterior al parche 14 puede permitir que los usuarios locales interactúen con On-Access Scan Messages - Threat Alert Window con privilegios elevados mediante la ejecución de McAfee Tray con privilegios elevados • https://kc.mcafee.com/corporate/index?page=content&id=SB10302 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

DLL Search Order Hijacking Vulnerability in the installer component of McAfee Host Intrusion Prevention System (Host IPS) for Windows prior to 8.0.0 Patch 15 Update allows attackers with local access to execute arbitrary code via execution from a compromised folder. Una vulnerabilidad de Secuestro de Órdenes de Búsqueda de DLL en el componente installer de McAfee Host Intrusion Prevention System (Host IPS) para Windows versiones anteriores a 8.0.0 Parche 15 Update, permite a atacantes con acceso local ejecutar código arbitrario mediante una ejecución desde una carpeta comprometida • https://kc.mcafee.com/corporate/index?page=content&id=SB10320 • CWE-426: Untrusted Search Path •

CVSS: 7.3EPSS: 0%CPEs: 3EXPL: 0

DLL Search Order Hijacking vulnerability in McAfee Agent (MA) prior to 5.6.4 allows attackers with local access to execute arbitrary code via execution from a compromised folder. La vulnerabilidad de Secuestro de Órdenes de Búsqueda de DLL en McAfee Agent (MA) versiones anteriores a 5.6.4, permite a atacantes con acceso local ejecutar código arbitrario mediante una ejecución desde una carpeta comprometida • https://kc.mcafee.com/corporate/index?page=content&id=SB10320 • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

Privilege escalation vulnerability in McAfee Total Protection (ToPS) for Mac OS prior to 4.6 allows local users to gain root privileges via incorrect protection of temporary files. Una vulnerabilidad de Escalada de Privilegios en McAfee Total Protection (ToPS) para Mac OS versión anterior a 4.6, permite a usuarios locales alcanzar privilegios root por medio de la protección incorrecta de archivos temporales • http://service.mcafee.com/FAQDocument.aspx?&id=TS103052 • CWE-269: Improper Privilege Management •

CVSS: 6.5EPSS: 0%CPEs: 727EXPL: 0

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Una limpieza incompleta de operaciones de lectura de un registro especial específico en algunos Intel® Processors puede permitir a un usuario autenticado habilitar potencialmente una divulgación de información por medio de un acceso local A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both. • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html http://www.openwall.com/lists/oss-security/2020/07/14/5 https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf https://kc.mcafee.com/corporate/index?page=content&id=SB10318 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message • CWE-459: Incomplete Cleanup •