Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mcafee application control vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2016-8009
Privilege escalation vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and 6.x versions allows malicious users to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.
Mcafee Application Control 7.0.0
Mcafee Application Control 6.1.0
Mcafee Application Control 6.1.2
Mcafee Application Control 6.1.3
Mcafee Application Control 6.2.0
Mcafee Application Control 6.0.0
Mcafee Application Control 6.1.1
1 Article
4.3
CVSSv2
CVE-2014-9920
Unauthorized execution of binary vulnerability in McAfee (now Intel Security) McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and previous v...
Mcafee Application Control 6.0.0
Mcafee Application Control 6.1.0
Mcafee Application Control 6.1.1
Mcafee Application Control 6.1.2
Mcafee Application Control 6.1.3
Mcafee Application Control 6.0.1
5
CVSSv2
CVE-2012-4593
McAfee Application Control and Change Control 5.1.x and 6.0.0 do not enforce an intended password requirement in certain situations involving attributes of the password file, which allows local users to bypass authentication by executing a command.
Mcafee Application Control 5.1.0
Mcafee Change Control 5.1.0
Mcafee Change Control 5.1.1
Mcafee Change Control 5.1.2
Mcafee Application Control 6.0.0
Mcafee Change Control 6.0.0
Mcafee Application Control 5.1.1
Mcafee Application Control 5.1.2
2.1
CVSSv2
CVE-2013-7461
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Change Control (MCC) 6.1.0 for Linux and previous versions allows authenticated users to change files that are part of write protection rules via specific conditions.
Mcafee Change Control
Mcafee Application Control
2.1
CVSSv2
CVE-2013-7460
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Application Control (MAC) 6.1.0 for Linux and previous versions allows authenticated users to change binaries that are part of the Application Control whitelist and allows execution of binaries v...
Mcafee Application Control
Mcafee Change Control
4.6
CVSSv2
CVE-2017-3912
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
Mcafee Application And Change Control 6.2.0
Mcafee Application And Change Control 7.0.1
4.6
CVSSv2
CVE-2016-8010
Application protections bypass vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and previous versions and Endpoint Security (ENS) 10.2 and previous versions allows local users to bypass local security protection via a command-line utility.
Mcafee Application Control
Mcafee Endpoint Security
4.6
CVSSv2
CVE-2018-6668
A whitelist bypass vulnerability in McAfee Application Control / Change Control 7.0.1 and before allows execution bypass, for example, with simple DLL through interpreters such as PowerShell.
Mcafee Application Change Control
5.2
CVSSv2
CVE-2018-6669
A whitelist bypass vulnerability in McAfee Application Control / Change Control 7.0.1 and before allows a remote or local user to execute blacklisted files through an ASP.NET form.
Mcafee Application Change Control
4.6
CVSSv2
CVE-2020-7334
Improper privilege assignment vulnerability in the installer McAfee Application and Change Control (MACC) before 8.3.2 allows local administrators to change or update the configuration settings via a carefully constructed MSI configured to mimic the genuine installer. This versio...
Mcafee Application And Change Control
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »