CVE-2019-3649 – Advanced Threat Defense (ATD) - Information Disclosure vulnerability
https://notcve.org/view.php?id=CVE-2019-3649
Information Disclosure vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attackers to gain access to hashed credentials via carefully constructed POST request extracting incorrectly recorded data from log files. Una vulnerabilidad de Divulgación de Información en McAfee Advanced Threat Defense (ATD) versiones anteriores a la versión 4.8, permite a atacantes autenticados remotos conseguir acceso a credenciales del hash mediante una petición POST cuidadosamente construida extrayendo datos grabados incorrectamente desde los archivos de log. • https://kc.mcafee.com/corporate/index?page=content&id=SB10304 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2019-3641 – Exploitation of Authorization in TIE Server
https://notcve.org/view.php?id=CVE-2019-3641
Abuse of Authorization vulnerability in APIs exposed by TIE server in McAfee Threat Intelligence Exchange Server (TIE Server) 3.0.0 allows remote authenticated users to modify stored reputation data via specially crafted messages. Una vulnerabilidad de abuso de autorización en las API expuestas por el servidor TIE en McAfee Threat Intelligence Exchange Server (TIE Server) versión 3.0.0, permite a usuarios autenticados remotos modificar los datos de reputación almacenados por medio de mensajes especialmente diseñados. • https://kc.mcafee.com/corporate/index?page=content&id=SB10303 • CWE-285: Improper Authorization •
CVE-2019-3648 – Implicit loading of DLLs
https://notcve.org/view.php?id=CVE-2019-3648
A Privilege Escalation vulnerability in the Microsoft Windows client in McAfee Total Protection 16.0.R22 and earlier allows administrators to execute arbitrary code via carefully placing malicious files in specific locations protected by administrator permission. Una vulnerabilidad de escalada de privilegios en el cliente de Microsoft Windows en McAfee Total Protection versión 16.0.R22 y anteriores, permite a administradores ejecutar código arbitrario mediante la colocación cuidadosa de archivos maliciosos dentro de ubicaciones específicas protegidas mediante permiso de administrador. • https://safebreach.com/Post/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648 https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102984 • CWE-426: Untrusted Search Path •
CVE-2019-3636 – File masquerade attack vulnerability in McAfee Total Protection
https://notcve.org/view.php?id=CVE-2019-3636
A File Masquerade vulnerability in McAfee Total Protection (MTP) version 16.0.R21 and earlier in Windows client allowed an attacker to read the plaintext list of AV-Scan exclusion files from the Windows registry, and to possibly replace excluded files with potential malware without being detected. Una vulnerabilidad de Enmascaramiento de Archivos en McAfee Total Protection (MTP) versión 16.0.R21 y anteriores, en el cliente de Windows permitió a un atacante leer la lista de texto plano de los archivos de exclusión de AV-Scan desde el registro de Windows, y posiblemente reemplazar los archivos excluidos con un malware potencial sin ser detectado. • https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102982 • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2019-2933
https://notcve.org/view.php?id=CVE-2019-2933
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. • http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://kc.mcafee.com/corporate/index?page=content&id=SB10315 https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html https://security.netapp.com/advisory/ntap-20191017-0001 •