Show filters
29 Total Results
Displaying 21-29 of 29
Sort by:
Attacker Value
Unknown

File masquerade attack vulnerability in McAfee Total Protection

Disclosure Date: October 28, 2019 (last updated November 08, 2023)
A File Masquerade vulnerability in McAfee Total Protection (MTP) version 16.0.R21 and earlier in Windows client allowed an attacker to read the plaintext list of AV-Scan exclusion files from the Windows registry, and to possibly replace excluded files with potential malware without being detected.
Attacker Value
Unknown

McAfee Total Protection - Free Antivirus Trial: DLL Search Order Hijacking vuln…

Disclosure Date: September 13, 2019 (last updated November 08, 2023)
DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights.
Attacker Value
Unknown

Exploitation of Privilege/Trust vulnerability

Disclosure Date: January 28, 2019 (last updated November 08, 2023)
Exploitation of Privilege/Trust vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.R18 allows local users to bypass product self-protection, tamper with policies and product files, and uninstall McAfee software without permission via specially crafted malware.
0
Attacker Value
Unknown

DLL Search Order Hijacking vulnerability

Disclosure Date: January 23, 2019 (last updated November 08, 2023)
DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.18 allows local users to execute arbitrary code via execution from a compromised folder.
0
Attacker Value
Unknown

SB10193 - consumer and corporate products - Maliciously misconfigured registry …

Disclosure Date: April 03, 2018 (last updated November 08, 2023)
Maliciously misconfigured registry vulnerability in all Microsoft Windows products in McAfee consumer and corporate products allows an administrator to inject arbitrary code into a debugged McAfee process via manipulation of registry parameters.
0
Attacker Value
Unknown

CVE-2010-5166

Disclosure Date: August 25, 2012 (last updated November 08, 2023)
Race condition in McAfee Total Protection 2010 10.0.580 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
0
Attacker Value
Unknown

CVE-2009-3587

Disclosure Date: October 13, 2009 (last updated October 04, 2023)
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted RAR archive file that triggers heap corruption, a different vulnerability than CVE-2009-3588.
0
Attacker Value
Unknown

CVE-2009-3588

Disclosure Date: October 13, 2009 (last updated October 04, 2023)
Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587.
0
Attacker Value
Unknown

CVE-2009-1348

Disclosure Date: April 30, 2009 (last updated October 04, 2023)
The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive.
0