McAfee VirusScan Enterprise (VSE) 8.8.0 Patch 8

CPE Details

McAfee VirusScan Enterprise (VSE) 8.8.0 Patch 8
8.8.0
2017-05-05
22h35 +00:00
2021-05-18
15h10 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:mcafee:virusscan_enterprise:8.8.0:patch8:*:*:*:*:*:*

Informations

Vendor

mcafee

Product

virusscan_enterprise

Version

8.8.0

Update

patch8

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2018-6674 2018-05-25 11h00 +00:00 Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 13 allows local users to spawn unrelated processes with elevated privileges via the system administrator granting McTray.exe elevated privileges (by default it runs with the current user's privileges).
6.8
Moyen
CVE-2016-8030 2017-04-25 14h00 +00:00 A memory corruption vulnerability in Scriptscan COM Object in McAfee VirusScan Enterprise 8.8 Patch 8 and earlier allows remote attackers to create a Denial of Service on the active Internet Explorer tab via a crafted HTML link.
4.3
Moyen
CVE-2016-4534 2016-05-05 16h00 +00:00 The McAfee VirusScan Console (mcconsol.exe) in McAfee VirusScan Enterprise 8.8.0 before Hotfix 1123565 (8.8.0.1546) on Windows allows local administrators to bypass intended self-protection rules and unlock the console window by closing registry handles.
3
Bas
CVE-2015-8577 2015-12-16 17h00 +00:00 The Buffer Overflow Protection (BOP) feature in McAfee VirusScan Enterprise before 8.8 Patch 6 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses on 32-bit platforms when protecting another application, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
2.6
CVE-2009-1348 2009-04-30 18h00 +00:00 The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive.
7.6