Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mcafee application control vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2016-8009
Privilege escalation vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and 6.x versions allows malicious users to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.
Mcafee Application Control 6.1.0
Mcafee Application Control 6.2.0
Mcafee Application Control 6.1.2
Mcafee Application Control 6.1.3
Mcafee Application Control 7.0.0
Mcafee Application Control 6.1.1
Mcafee Application Control 6.0.0
1 Article
5.9
CVSSv3
CVE-2014-9920
Unauthorized execution of binary vulnerability in McAfee (now Intel Security) McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and previous v...
Mcafee Application Control 6.1.0
Mcafee Application Control 6.1.2
Mcafee Application Control 6.1.3
Mcafee Application Control 6.1.1
Mcafee Application Control 6.0.1
Mcafee Application Control 6.0.0
6.6
CVSSv3
CVE-2016-1715
The swin.sys kernel driver in McAfee Application Control (MAC) 6.1.0 before build 706, 6.1.1 before build 404, 6.1.2 before build 449, 6.1.3 before build 441, and 6.2.0 before build 505 on 32-bit Windows platforms allows local users to cause a denial of service (memory corruption...
Microsoft Windows
Mcafee Application Control 6.1.0
Mcafee Application Control 6.1.1
Mcafee Application Control 6.1.2
Mcafee Application Control 6.1.3
Mcafee Application Control 6.2.0
NA
CVE-2012-4593
McAfee Application Control and Change Control 5.1.x and 6.0.0 do not enforce an intended password requirement in certain situations involving attributes of the password file, which allows local users to bypass authentication by executing a command.
Mcafee Application Control 5.1.1
Mcafee Change Control 5.1.0
Mcafee Change Control 6.0.0
Mcafee Change Control 5.1.1
Mcafee Change Control 5.1.2
Mcafee Application Control 5.1.0
Mcafee Application Control 5.1.2
Mcafee Application Control 6.0.0
7.1
CVSSv3
CVE-2018-6690
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and previous versions allows authenticated users to execute arbitrary code via file transfer from external system.
Mcafee Application Change Control
Mcafee Application Change Control 8.0.0
5.5
CVSSv3
CVE-2013-7460
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Application Control (MAC) 6.1.0 for Linux and previous versions allows authenticated users to change binaries that are part of the Application Control whitelist and allows execution of binaries v...
Mcafee Change Control
Mcafee Application Control
5.5
CVSSv3
CVE-2013-7461
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Change Control (MCC) 6.1.0 for Linux and previous versions allows authenticated users to change files that are part of write protection rules via specific conditions.
Mcafee Change Control
Mcafee Application Control
7.8
CVSSv3
CVE-2017-3912
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
Mcafee Application And Change Control 6.2.0
Mcafee Application And Change Control 7.0.1
7.8
CVSSv3
CVE-2016-8010
Application protections bypass vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and previous versions and Endpoint Security (ENS) 10.2 and previous versions allows local users to bypass local security protection via a command-line utility.
Mcafee Application Control
Mcafee Endpoint Security
7.8
CVSSv3
CVE-2018-6668
A whitelist bypass vulnerability in McAfee Application Control / Change Control 7.0.1 and before allows execution bypass, for example, with simple DLL through interpreters such as PowerShell.
Mcafee Application Change Control
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »