CVE-2018-6674 – Privilege escalation vulnerability in McAfee VSE when McTray run with elevated privileges
https://notcve.org/view.php?id=CVE-2018-6674
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 13 allows local users to spawn unrelated processes with elevated privileges via the system administrator granting McTray.exe elevated privileges (by default it runs with the current user's privileges). Vulnerabilidad de escalada de privilegios en el cliente (McTray.exe) de Microsoft Windows en VirusScan Enterprise (VSE) de McAfee versión 8.8 anterior a parche 13, permite a los usuarios locales causar procesos no relacionados con privilegios elevados por medio del administrador de sistema que otorga privilegios elevados a McTray.exe (por defecto, se ejecuta con los privilegios del usuario actual). • https://kc.mcafee.com/corporate/index?page=content&id=SB10237 • CWE-264: Permissions, Privileges, and Access Controls CWE-269: Improper Privilege Management CWE-274: Improper Handling of Insufficient Privileges CWE-311: Missing Encryption of Sensitive Data •
CVE-2017-3961 – SB10192 - Network Security Management (NSM) - Cross-Site Scripting (XSS) vulnerability
https://notcve.org/view.php?id=CVE-2017-3961
Cross-Site Scripting (XSS) vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via crafted user input of attributes. Vulnerabilidad de Cross-Site Scripting (XSS) en la interfaz web en McAfee Network Security Management (NSM) en versiones anteriores a la 8.2.7.42.2 permite que usuarios autenticados puedan reflejar código HTML arbitrario en la página web de respuesta mediante entradas de atributos de usuarios que hayan sido manipuladas. • https://kc.mcafee.com/corporate/index?page=content&id=SB10192 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-10381
https://notcve.org/view.php?id=CVE-2018-10381
TunnelBear 3.2.0.6 for Windows suffers from a SYSTEM privilege escalation vulnerability through the "TunnelBearMaintenance" service. This service establishes a NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The "OpenVPNConnect" method accepts a server list argument that provides attacker control of the OpenVPN command line. An attacker can specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user. • https://github.com/VerSprite/research/blob/master/advisories/VS-2018-022.md • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2017-3964 – SB10192 - Network Security Management (NSM) - Reflective Cross-Site Scripting (XSS) vulnerability
https://notcve.org/view.php?id=CVE-2017-3964
Reflective Cross-Site Scripting (XSS) vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows attackers to inject arbitrary web script or HTML via a URL parameter. Vulnerabilidad de Cross-Site Scripting (XSS) reflejado en la interfaz web en McAfee Network Security Management (NSM), en versiones anteriores a la 8.2.7.42.2, permite que atacantes inyecten scripts web o HTML arbitrarios mediante un parámetro URL. • https://kc.mcafee.com/corporate/index?page=content&id=SB10192 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-3966 – SB10192 - Network Security Management (NSM) - Exploitation of session variables, resource IDs and other trusted credentials vulnerability
https://notcve.org/view.php?id=CVE-2017-3966
Exploitation of session variables, resource IDs and other trusted credentials vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to exploit or harm a user's browser via reusing the exposed session token in the application URL. Vulnerabilidad de explotación de variables de sesión, ID de los recursos y otras credenciales de confianza en la interfaz web en McAfee Network Security Management (NSM), en versiones anteriores a la 8.2.7.42.2, permite que atacantes remotos exploten o dañen el navegador de un usuario reutilizando el token de sesión expuesto en la URL de la aplicación. • https://kc.mcafee.com/corporate/index?page=content&id=SB10192 • CWE-613: Insufficient Session Expiration •