10 results (0.018 seconds)

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

20 Apr 2022 — A URL redirection vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.9, 9.x prior to 9.2.20, 8.x prior to 8.2.27, and 7.x prior to 7.8.2.31, and controlled release 11.x prior to 11.1.3 allows a remote attacker to redirect a user to a malicious website controlled by the attacker. This is possible because SWG incorrectly creates a HTTP redirect response when a user clicks a carefully constructed URL. Following the redirect response, the new request is still filtered by the SWG policy. Una vulner... • https://kc.mcafee.com/corporate/index?page=content&id=SB10381 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

17 Feb 2021 — Privilege escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.8 allows an authenticated user to gain elevated privileges through the User Interface and execute commands on the appliance via incorrect improper neutralization of user input in the troubleshooting page. Una vulnerabilidad de escalada de privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.8, permite a un usuario autenticado alcanzar privilegios elevados por medio de la interfaz de usuario y ejecutar comandos en el di... • https://kc.mcafee.com/corporate/index?page=content&id=SB10349 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 92%CPEs: 39EXPL: 95

26 Jan 2021 — Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. Sudo versiones anteriores a 1.9.5p2 contiene un error de desbordamiento que puede resultar en un desbordamiento de búfer basado en la pila, lo que permite la escalada de privilegios a root a través de "sudoedit -s" y un argumento de línea de comandos que termina con un solo caráct... • https://packetstorm.news/files/id/176932 • CWE-122: Heap-based Buffer Overflow CWE-193: Off-by-one Error •

CVSS: 5.7EPSS: 0%CPEs: 3EXPL: 0

15 Sep 2020 — Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user to access protected dashboard data via improper access control in the user interface. Una vulnerabilidad de Escalada de Privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite a un usuario de la interfaz de usuario autenticado acceder a los datos protegidos del panel por medio de un control de acceso inapropiado en la interfaz de usuario • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-287: Improper Authentication •

CVSS: 5.7EPSS: 0%CPEs: 3EXPL: 0

15 Sep 2020 — Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user to access protected configuration files via improper access control in the user interface. Una vulnerabilidad de Escalada de Privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite a un usuario autenticado de la interfaz de usuario acceder a archivos de configuración protegidos por medio de un control de acceso inapropiado en la interfaz de usuario • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-287: Improper Authentication •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

15 Sep 2020 — Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user to delete or download protected log data via improper access controls in the user interface. Una vulnerabilidad de Escalada de Privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite a un usuario autenticado de la interfaz de usuario eliminar o descargar datos de registro protegidos por medio de controles de acceso inapropiados en la interfaz de usuario • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-287: Improper Authentication •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

15 Sep 2020 — Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user to delete or download protected files via improper access controls in the REST interface. Una vulnerabilidad de Escalada de Privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite a un usuario autenticado de la interfaz de usuario eliminar o descargar archivos protegidos por medio de controles de acceso inapropiados en la interfaz REST • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

15 Sep 2020 — Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user with low permissions to change the system's root password via improper access controls in the user interface. Una vulnerabilidad de Escalada de Privilegios en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite a usuarios de la interfaz de usuario autenticados con permisos bajos cambiar la contraseña root del sistema por medio de controles de acceso inapropiados en la interfaz de... • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

15 Jul 2020 — Inappropriate Encoding for output context vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows a remote attacker to cause MWG to return an ambiguous redirect response via getting a user to click on a malicious URL. Una Codificación Inapropiada para el contexto de salida en McAfee Web Gateway (MWG) versiones anteriores a 9.2.1, permite al atacante remoto causar que MWG devuelva una respuesta de redireccionamiento ambigua haciendo que un usuario haga clic en una URL maliciosa. • https://kc.mcafee.com/corporate/index?page=content&id=SB10323 • CWE-838: Inappropriate Encoding for Output Context •

CVSS: 5.9EPSS: 5%CPEs: 180EXPL: 0

26 Feb 2019 — If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order ... • http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html • CWE-203: Observable Discrepancy CWE-325: Missing Cryptographic Step •