Page 4 of 41 results (0.009 seconds)

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

19 Sep 2006 — The VirusScan On-Access Scan component in McAfee VirusScan Enterprise 7.1.0 and Scan Engine 4.4.00 allows local privileged users to bypass security restrictions and disable the On-Access Scan option by opening the program via the task bar and quickly clicking the Disable button, possibly due to an interface-related race condition. El componente VirusScan On-Access Scan en McAfee VirusScan Enterprise 7.1.0 y Scan Engine 4.4.00 permite a usuarios locales con privilegios evitar restricciones de seguridad y des... • http://securityreason.com/securityalert/1605 •

CVSS: 9.8EPSS: 70%CPEs: 25EXPL: 1

01 Aug 2006 — Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf. Desbordamiento de búfer en control ActiveX McSubMgr (mcsubmgr.dll) en McAfee Security Center 6.0.23 para Internet Security Suite 200... • https://www.exploit-db.com/exploits/16510 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

13 Jul 2006 — Unknown vulnerability in the Buffer Overflow Protection in McAfee VirusScan Enterprise 8.0.0 allows local users to cause a denial of service (unstable operation) via a long string in the (1) "Process name", (2) "Module name", or (3) "API name" fields. Vulnerabilidad desconocida en la protección de desbordamiento de búfer en McAfee VirusScan Enterprise 8.0.0 permite a usuarios locales provocar denegación de servicio (operación inestable) a través de una cadena larga en los campos (1) "Process name", (2) "Mod... • http://securityreason.com/securityalert/1216 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 3

23 Dec 2005 — Unquoted Windows search path vulnerability in McAfee VirusScan Enterprise 8.0i (patch 11) and CMA 3.5 (patch 5) might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run by naPrdMgr.exe when it attempts to execute EntVUtil.EXE under an unquoted "Program Files" path. • https://www.exploit-db.com/exploits/26970 •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

21 Dec 2005 — The ActiveX control in MCINSCTL.DLL for McAfee VirusScan Security Center does not use the IObjectSafetySiteLock API to restrict access to required domains, which allows remote attackers to create or append to arbitrary files via the StartLog and AddLog methods in the MCINSTALL.McLog object. • http://secunia.com/advisories/18169 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

14 Sep 2004 — McAfee VirusScan 4.5.1 does not drop SYSTEM privileges before allowing users to browse for files via the "System Scan" properties of the System Tray applet, which could allow local users to gain privileges. • http://marc.info/?l=bugtraq&m=109526269429728&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — McAfee VirusScan 4.5.1, when the WebScanX.exe module is enabled, searches for particular DLLs from the user's home directory, even when browsing the local hard drive, which allows local users to run arbitrary code via malicious versions of those DLLs. • http://archives.neohapsis.com/archives/bugtraq/2002-12/0007.html •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

11 Jul 2001 — Directory traversal vulnerability in McAfee ASaP VirusScan agent 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP request. • http://www.iss.net/security_center/static/6834.php •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

19 Dec 2000 — The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q4/0073.html •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

08 Jun 2000 — Mcafee VirusScan 4.03 does not properly restrict access to the alert text file before it is sent to the Central Alert Server, which allows local users to modify alerts in an arbitrary fashion. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0038.html •