Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mcafee virusscan vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv3
CVE-2016-8018
Cross-site request forgery (CSRF) vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and previous versions) allows authenticated remote malicious users to execute unauthorized commands via a crafted user input.
Mcafee Virusscan Enterprise
1 EDB exploit
1 Article
6.2
CVSSv3
CVE-2016-8025
SQL injection vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and previous versions) allows remote authenticated users to obtain product information via a crafted HTTP request parameter.
Mcafee Virusscan Enterprise
1 EDB exploit
1 Article
8.4
CVSSv3
CVE-2020-7266
Privilege Escalation vulnerability in McAfee VirusScan Enterprise (VSE) for Windows before 8.8 Patch 14 Hotfix 116778 allows local users to delete files the user would otherwise not have access to via manipulating symbolic links to redirect a McAfee delete action to an unintended...
Mcafee Virusscan Enterprise
4.3
CVSSv3
CVE-2016-8030
A memory corruption vulnerability in Scriptscan COM Object in McAfee VirusScan Enterprise 8.8 Patch 8 and previous versions allows remote malicious users to create a Denial of Service on the active Internet Explorer tab via a crafted HTML link.
Mcafee Virusscan Enterprise
NA
CVE-2002-2282
McAfee VirusScan 4.5.1, when the WebScanX.exe module is enabled, searches for particular DLLs from the user's home directory, even when browsing the local hard drive, which allows local users to run arbitrary code via malicious versions of those DLLs.
Mcafee Virusscan 4.5.1
NA
CVE-2000-0502
Mcafee VirusScan 4.03 does not properly restrict access to the alert text file before it is sent to the Central Alert Server, which allows local users to modify alerts in an arbitrary fashion.
Mcafee Virusscan 4.0.3
NA
CVE-2000-1128
The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory.
Mcafee Virusscan 4.5
NA
CVE-2006-4886
The VirusScan On-Access Scan component in McAfee VirusScan Enterprise 7.1.0 and Scan Engine 4.4.00 allows local privileged users to bypass security restrictions and disable the On-Access Scan option by opening the program via the task bar and quickly clicking the Disable button, ...
Mcafee Scan Engine 4.4.00
Mcafee Virusscan Enterprise 7.1.0
7.8
CVSSv3
CVE-2019-3585
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow local users to interact with the On-Access Scan Messages - Threat Alert Window with elevated privileges via running McAfee Tray with el...
Mcafee Virusscan Enterprise 8.8
6.8
CVSSv3
CVE-2019-3588
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow unauthorized users to interact with the On-Access Scan Messages - Threat Alert Window when the Windows Login Screen is locked.
Mcafee Virusscan Enterprise 8.8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »