Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mcafee virusscan vulnerabilities and exploits
(subscribe to this query)
355
VMScore
CVE-2016-8021
Improper verification of cryptographic signature vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and previous versions) allows remote authenticated users to spoof update server and execute arbitrary code via a crafted input file.
Mcafee Virusscan Enterprise
1 EDB exploit
1 Article
515
VMScore
CVE-2016-8022
Authentication bypass by spoofing vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and previous versions) allows remote unauthenticated malicious user to execute arbitrary code or cause a denial of service via a crafted authentication cookie.
Mcafee Virusscan Enterprise
1 EDB exploit
1 Article
685
VMScore
CVE-2016-8023
Authentication bypass by assumed-immutable data vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and previous versions) allows remote unauthenticated malicious user to bypass server authentication via a crafted authentication cookie.
Mcafee Virusscan Enterprise
1 EDB exploit
1 Article
685
VMScore
CVE-2016-8024
Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and previous versions) allows remote unauthenticated malicious user to obtain sensitive information via the server HTTP response spoofing.
Mcafee Virusscan Enterprise
1 EDB exploit
1 Article
605
VMScore
CVE-2016-8025
SQL injection vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and previous versions) allows remote authenticated users to obtain product information via a crafted HTTP request parameter.
Mcafee Virusscan Enterprise
1 EDB exploit
1 Article
187
VMScore
CVE-2000-0502
Mcafee VirusScan 4.03 does not properly restrict access to the alert text file before it is sent to the Central Alert Server, which allows local users to modify alerts in an arbitrary fashion.
Mcafee Virusscan 4.0.3
409
VMScore
CVE-2000-1128
The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory.
Mcafee Virusscan 4.5
329
VMScore
CVE-2006-4886
The VirusScan On-Access Scan component in McAfee VirusScan Enterprise 7.1.0 and Scan Engine 4.4.00 allows local privileged users to bypass security restrictions and disable the On-Access Scan option by opening the program via the task bar and quickly clicking the Disable button, ...
Mcafee Scan Engine 4.4.00
Mcafee Virusscan Enterprise 7.1.0
641
VMScore
CVE-2019-3585
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow local users to interact with the On-Access Scan Messages - Threat Alert Window with elevated privileges via running McAfee Tray with el...
Mcafee Virusscan Enterprise 8.8
614
VMScore
CVE-2019-3588
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 14 may allow unauthorized users to interact with the On-Access Scan Messages - Threat Alert Window when the Windows Login Screen is locked.
Mcafee Virusscan Enterprise 8.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »