Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mcafee application control 6.2.0 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2016-8009
Privilege escalation vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and 6.x versions allows malicious users to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.
Mcafee Application Control 7.0.0
Mcafee Application Control 6.1.0
Mcafee Application Control 6.1.2
Mcafee Application Control 6.1.3
Mcafee Application Control 6.2.0
Mcafee Application Control 6.0.0
Mcafee Application Control 6.1.1
1 Article
4.6
CVSSv2
CVE-2017-3912
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
Mcafee Application And Change Control 6.2.0
Mcafee Application And Change Control 7.0.1
5.5
CVSSv2
CVE-2016-1715
The swin.sys kernel driver in McAfee Application Control (MAC) 6.1.0 before build 706, 6.1.1 before build 404, 6.1.2 before build 449, 6.1.3 before build 441, and 6.2.0 before build 505 on 32-bit Windows platforms allows local users to cause a denial of service (memory corruption...
Microsoft Windows
Mcafee Application Control 6.1.3
Mcafee Application Control 6.2.0
Mcafee Application Control 6.1.1
Mcafee Application Control 6.1.0
Mcafee Application Control 6.1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started