Vulnerabilities > Mcafee > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2007-03-02 | CVE-2007-1226 | Unspecified vulnerability in Mcafee Virex McAfee VirusScan for Mac (Virex) before 7.7 patch 1 has weak permissions (0666) for /Library/Application Support/Virex/VShieldExclude.txt, which allows local users to reconfigure Virex to skip scanning of arbitrary files. local mcafee | 4.1 |
2006-12-14 | CVE-2006-6474 | Remote Code Execution vulnerability in McAfee VirusScan For Linux Insecure DT_RPATH Untrusted search path vulnerability in McAfee VirusScan for Linux 4510e and earlier includes the current working directory in the DT_RPATH environment variable, which allows local users to load arbitrary ELF DSO libraries and execute arbitrary code by installing malicious libraries in that directory. | 4.6 |
2006-10-20 | CVE-2006-5417 | Remote Denial of Service vulnerability in McAfee Network Agent McAfee Network Agent (mcnasvc.exe) 1.0.178.0, as used by multiple McAfee products possibly including Internet Security Suite, Personal Firewall Plus, and VirusScan, allows remote attackers to cause a denial of service (agent crash) via a long packet, possibly because of an invalid string position field value. | 5.0 |
2006-08-01 | CVE-2006-3961 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mcafee products Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf. | 6.8 |
2006-07-18 | CVE-2006-3623 | Directory Traversal vulnerability in Mcafee Epolicy Orchestrator Agent 3.5.0 Directory traversal vulnerability in Framework Service component in McAfee ePolicy Orchestrator agent 3.5.0.x and earlier allows remote attackers to create arbitrary files via a .. | 5.0 |
2006-03-03 | CVE-2006-0982 | Security Bypass vulnerability in Mcafee Virex 7.7 The on-access scanner for McAfee Virex 7.7 for Macintosh, in some circumstances, might not activate when malicious content is accessed from the web browser, and might not prevent the content from being saved, which allows remote attackers to bypass virus protection, as demonstrated using the EICAR test file. | 5.0 |
2005-12-21 | CVE-2005-3657 | Unspecified vulnerability in Mcafee Mcinsctl.Dll and Virusscan Security Center The ActiveX control in MCINSCTL.DLL for McAfee VirusScan Security Center does not use the IObjectSafetySiteLock API to restrict access to required domains, which allows remote attackers to create or append to arbitrary files via the StartLog and AddLog methods in the MCINSTALL.McLog object. | 5.0 |
2005-10-30 | CVE-2005-3377 | Unspecified vulnerability in Mcafee Internet Security Suite 7.1.5Version9.1.08Engine4.4.00/8.0.0Patch10Engine4400 Multiple interpretation error in (1) McAfee Internet Security Suite 7.1.5 version 9.1.08 with the 4.4.00 engine and (2) McAfee Corporate 8.0.0 patch 10 with the 4400 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." | 5.1 |
2005-10-14 | CVE-2005-3215 | Multiple interpretation error in unspecified versions of McAfee Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. | 5.1 |
2005-07-11 | CVE-2005-2187 | Local Security vulnerability in IntruShield Security Management System McAfee IntruShield Security Management System allows remote authenticated users to access the "Generate Reports" feature and modify alerts by setting the Access option to true, as demonstrated using the (1) fullAccess or (2) fullAccessRight parameter in reports-column-center.jsp, or (3) fullAccess parameter to SystemEvent.jsp. | 4.6 |