Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mcafee virusscan enterprise 8.8 vulnerabilities and exploits
(subscribe to this query)
6.7
CVSSv3
CVE-2020-7337
Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) before 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful...
Mcafee Virusscan Enterprise 8.8
Mcafee Virusscan Enterprise
6.8
CVSSv3
CVE-2019-3588
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow unauthorized users to interact with the On-Access Scan Messages - Threat Alert Window when the Windows Login Screen is locked.
Mcafee Virusscan Enterprise 8.8
7.8
CVSSv3
CVE-2019-3585
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow local users to interact with the On-Access Scan Messages - Threat Alert Window with elevated privileges via running McAfee Tray with el...
Mcafee Virusscan Enterprise 8.8
7.8
CVSSv3
CVE-2020-7280
Privilege Escalation vulnerability during daily DAT updates when using McAfee Virus Scan Enterprise (VSE) before 8.8 Patch 15 allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links. T...
Mcafee Virusscan Enterprise 8.8
8.4
CVSSv3
CVE-2020-7267
Privilege Escalation vulnerability in McAfee VirusScan Enterprise (VSE) for Linux before 2.0.3 Hotfix 2635000 allows local users to delete files the user would otherwise not have access to via manipulating symbolic links to redirect a McAfee delete action to an unintended file. T...
Mcafee Virusscan Enterprise 8.8
NA
CVE-2010-5143
McAfee VirusScan Enterprise prior to 8.8 allows local users to disable the product by leveraging administrative privileges to execute an unspecified Metasploit Framework module.
Mcafee Virusscan Enterprise 8.0i
Mcafee Virusscan Enterprise 8.7i
Mcafee Virusscan Enterprise 8.7.00003
Mcafee Virusscan Enterprise
Mcafee Virusscan Enterprise 8.7.00004
Mcafee Virusscan Enterprise 8.6.0
Mcafee Virusscan Enterprise 8.5i
3
CVSSv3
CVE-2016-4534
The McAfee VirusScan Console (mcconsol.exe) in McAfee VirusScan Enterprise 8.8.0 before Hotfix 1123565 (8.8.0.1546) on Windows allows local administrators to bypass intended self-protection rules and unlock the console window by closing registry handles.
Mcafee Virusscan Enterprise 8.8.0
Microsoft Windows
1 EDB exploit
5.1
CVSSv3
CVE-2016-3984
The McAfee VirusScan Console (mcconsol.exe) in McAfee Active Response (MAR) prior to 1.1.0.161, Agent (MA) 5.x prior to 5.0.2 Hotfix 1110392 (5.0.2.333), Data Exchange Layer 2.x (DXL) prior to 2.0.1.140.1, Data Loss Prevention Endpoint (DLPe) 9.3 before Patch 6 and 9.4 before Pat...
Mcafee Data Loss Prevention Endpoint
Mcafee Agent
Mcafee Virusscan Enterprise
Mcafee Host Intrusion Prevention
Mcafee Active Response
Mcafee Data Exchange Layer
Mcafee Endpoint Security
1 EDB exploit
4.3
CVSSv3
CVE-2016-8030
A memory corruption vulnerability in Scriptscan COM Object in McAfee VirusScan Enterprise 8.8 Patch 8 and previous versions allows remote malicious users to create a Denial of Service on the active Internet Explorer tab via a crafted HTML link.
Mcafee Virusscan Enterprise
NA
CVE-2015-8577
The Buffer Overflow Protection (BOP) feature in McAfee VirusScan Enterprise prior to 8.8 Patch 6 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses on 32-bit platforms when protecting another application, which allows malicious users to bypass t...
Mcafee Virusscan Enterprise
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »