Page 6 of 58 results (0.009 seconds)

CVSS: 7.3EPSS: 0%CPEs: 3EXPL: 0

10 Jun 2020 — DLL Search Order Hijacking vulnerability in McAfee Agent (MA) prior to 5.6.4 allows attackers with local access to execute arbitrary code via execution from a compromised folder. La vulnerabilidad de Secuestro de Órdenes de Búsqueda de DLL en McAfee Agent (MA) versiones anteriores a 5.6.4, permite a atacantes con acceso local ejecutar código arbitrario mediante una ejecución desde una carpeta comprometida • https://kc.mcafee.com/corporate/index?page=content&id=SB10320 • CWE-427: Uncontrolled Search Path Element •

CVSS: 5.7EPSS: 0%CPEs: 2EXPL: 0

12 Mar 2020 — Improper access control vulnerability in masvc.exe in McAfee Agent (MA) prior to 5.6.4 allows local users with administrator privileges to disable self-protection via a McAfee supplied command-line utility. Una vulnerabilidad de control de acceso inapropiado en el archivo masvc.exe en McAfee Agent (MA) versiones anteriores a 5.6.4, permite a usuarios locales con privilegios de administrador deshabilitar la autoprotección mediante una utilidad de la línea de comandos suministrada por McAfee. • https://kc.mcafee.com/corporate/index?page=content&id=SB10312 • CWE-20: Improper Input Validation CWE-284: Improper Access Control •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

18 Jul 2019 — Privilege escalation vulnerability in McAfee Agent (MA) before 5.6.1 HF3, allows local administrator users to potentially disable some McAfee processes by manipulating the MA directory control and placing a carefully constructed file in the MA directory. La vulnerabilidad de escalada de privilegios en McAfee Agent (MA) antes de 5.6.1 HF3, permite a los usuarios de administradores locales potencialmente deshabilitar algunos procesos de McAfee al manipular el control de directorio de MA y colocar un archivo c... • https://kc.mcafee.com/corporate/index?page=content&id=SB10288 •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

28 Feb 2019 — Buffer Access with Incorrect Length Value in McAfee Agent (MA) 5.x allows remote unauthenticated users to potentially cause a denial of service via specifically crafted UDP packets. Un acceso de búfer con valor de longitud incorrecto en McAfee Agent (MA) 5.x podría permitir a los usuarios remotos no autenticados provocar una denegación de servicio (DoS) mediante paquetes UDP especialmente manipulados. • http://www.securityfocus.com/bid/107205 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

28 Feb 2019 — Information Disclosure vulnerability in Remote logging (which is disabled by default) in McAfee Agent (MA) 5.x allows remote unauthenticated users to access sensitive information via remote logging when it is enabled. Una vulnerabilidad de divulgación de información en el registro remoto (deshabilitado por defecto) en McAfee Agent (MA) 5.x permite a los usuarios remotos no autenticados acceder a información sensible mediante un registro remoto cuando éste está habilitado. • https://kc.mcafee.com/corporate/index?page=content&id=SB10271 •

CVSS: 5.9EPSS: 4%CPEs: 180EXPL: 0

26 Feb 2019 — If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order ... • http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html • CWE-203: Observable Discrepancy CWE-325: Missing Cryptographic Step •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 0

11 Dec 2018 — Use After Free in Remote logging (which is disabled by default) in McAfee McAfee Agent (MA) 5.x prior to 5.6.0 allows remote unauthenticated attackers to cause a Denial of Service and potentially a remote code execution via a specially crafted HTTP header sent to the logging service. Un uso de memoria previamente liberada en el inicio de sesión remoto (deshabilitado por defecto) en McAfee Agent (MA), en las versiones 5.x anteriores a la 5.60, permite a los atacantes remotos no autenticados provocar una dene... • https://kc.mcafee.com/corporate/index?page=content&id=SB10258 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

30 Oct 2018 — The Leostream Agent before Build 7.0.1.0 when used with Leostream Connection Broker 8.2.72 or earlier allows remote attackers to modify registry keys via the Leostream Agent API. Leostream Agent en versiones anteriores a la Build 7.0.1.0 al emplearse con Leostream Connection Broker 8.2.72 o anteriores permite que atacantes remotos modifiquen las claves de registro mediante la API Leostream Agent. • https://leostream.kayako.com/Knowledgebase/Article/View/85/52/leostream-agent-security-update •