2 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

A Privilege Escalation vulnerability in the Microsoft Windows client in McAfee Total Protection 16.0.R22 and earlier allows administrators to execute arbitrary code via carefully placing malicious files in specific locations protected by administrator permission. Una vulnerabilidad de escalada de privilegios en el cliente de Microsoft Windows en McAfee Total Protection versión 16.0.R22 y anteriores, permite a administradores ejecutar código arbitrario mediante la colocación cuidadosa de archivos maliciosos dentro de ubicaciones específicas protegidas mediante permiso de administrador. • https://safebreach.com/Post/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648 https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102984 • CWE-426: Untrusted Search Path •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 4

K7Sentry.sys in K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 IOCTL call. K7Sentry.sys en K7 Computing Ultimate Security, Anti-Virus Plus, y Total Security anterior a 14.2.0.253 permite a usuarios locales escribir a localizaciones de memoria arbitrarias, y como consecuencia ganar privilegios, a través de una llamada IOCTL 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, o 0x950025c8 manipulada. Multiple products from K7 Computing suffer from an arbitrary write privilege escalation vulnerability. • https://www.exploit-db.com/exploits/35992 http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html http://www.exploit-db.com/exploits/35992 http://www.greyhathacker.net/?p=818 http://www.osvdb.org/113007 • CWE-264: Permissions, Privileges, and Access Controls •