Vulnerabilites related to mcafee - security_scan_plus
CVE-2015-8991 (GCVE-0-2015-8991)
Vulnerability from cvelistv5
Published
2017-03-14 22:00
Modified
2024-08-06 08:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Malicious file execution vulnerability
Summary
Malicious file execution vulnerability in Intel Security McAfee Security Scan+ (MSS+) before 3.11.266.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.
References
▼ | URL | Tags |
---|---|---|
https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel | McAfee Security Scan+ (MSS+) |
Version: before 3.11.266.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:36:31.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "McAfee Security Scan+ (MSS+)", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before 3.11.266.3" } ] } ], "datePublic": "2015-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Malicious file execution vulnerability in Intel Security McAfee Security Scan+ (MSS+) before 3.11.266.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious file execution vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-14T21:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2015-8991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "McAfee Security Scan+ (MSS+)", "version": { "version_data": [ { "version_value": "before 3.11.266.3" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Malicious file execution vulnerability in Intel Security McAfee Security Scan+ (MSS+) before 3.11.266.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious file execution vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462", "refsource": "MISC", "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2015-8991", "datePublished": "2017-03-14T22:00:00", "dateReserved": "2017-02-27T00:00:00", "dateUpdated": "2024-08-06T08:36:31.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-8993 (GCVE-0-2015-8993)
Vulnerability from cvelistv5
Published
2017-03-14 22:00
Modified
2024-08-06 08:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Malicious file execution vulnerability
Summary
Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.
References
▼ | URL | Tags |
---|---|---|
https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel | CloudAV (Beta) |
Version: before 0.5.0.151.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:36:31.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CloudAV (Beta)", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before 0.5.0.151.3" } ] } ], "datePublic": "2015-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious file execution vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-14T21:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2015-8993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CloudAV (Beta)", "version": { "version_data": [ { "version_value": "before 0.5.0.151.3" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious file execution vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462", "refsource": "MISC", "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2015-8993", "datePublished": "2017-03-14T22:00:00", "dateReserved": "2017-02-27T00:00:00", "dateUpdated": "2024-08-06T08:36:31.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-3897 (GCVE-0-2017-3897)
Vulnerability from cvelistv5
Published
2017-09-01 13:00
Modified
2024-09-17 02:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Code Injection vulnerability
Summary
A Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/100100 | vdb-entry, x_refsource_BID | |
http://service.mcafee.com/FAQDocument.aspx?lc=1033&id=TS102723 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | McAfee | Live Safe |
Version: 16.0.3 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "100100", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100100" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://service.mcafee.com/FAQDocument.aspx?lc=1033\u0026id=TS102723" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Live Safe", "vendor": "McAfee", "versions": [ { "status": "affected", "version": "16.0.3" } ] }, { "product": "Security Scan Plus", "vendor": "McAfee", "versions": [ { "status": "affected", "version": "3.11.599.3" } ] } ], "datePublic": "2017-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "A Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-02T09:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "100100", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100100" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://service.mcafee.com/FAQDocument.aspx?lc=1033\u0026id=TS102723" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-08-31T00:00:00", "ID": "CVE-2017-3897", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Live Safe", "version": { "version_data": [ { "version_value": "16.0.3" } ] } }, { "product_name": "Security Scan Plus", "version": { "version_data": [ { "version_value": "3.11.599.3" } ] } } ] }, "vendor_name": "McAfee" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "100100", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100100" }, { "name": "http://service.mcafee.com/FAQDocument.aspx?lc=1033\u0026id=TS102723", "refsource": "CONFIRM", "url": "http://service.mcafee.com/FAQDocument.aspx?lc=1033\u0026id=TS102723" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-3897", "datePublished": "2017-09-01T13:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-17T02:57:59.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8008 (GCVE-0-2016-8008)
Vulnerability from cvelistv5
Published
2017-03-14 22:00
Modified
2024-08-06 02:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege escalation vulnerability
Summary
Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system.
References
▼ | URL | Tags |
---|---|---|
https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102593 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel | Security Scan Plus (SSP) |
Version: 3.11.376 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:13:21.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102593" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Security Scan Plus (SSP)", "vendor": "Intel", "versions": [ { "status": "affected", "version": "3.11.376" } ] } ], "datePublic": "2016-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-14T21:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102593" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2016-8008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Security Scan Plus (SSP)", "version": { "version_data": [ { "version_value": "3.11.376" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102593", "refsource": "MISC", "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102593" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2016-8008", "datePublished": "2017-03-14T22:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T02:13:21.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-37025 (GCVE-0-2022-37025)
Vulnerability from cvelistv5
Published
2022-08-18 12:23
Modified
2024-08-03 10:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An improper privilege management vulnerability in McAfee Security Scan Plus (MSS+) before 4.1.262.1 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code due to lack of an integrity check of the configuration file.
References
▼ | URL | Tags |
---|---|---|
https://www.mcafee.com/en-us/antivirus/mcafee-security-scan-plus.html | x_refsource_MISC | |
https://attack.mitre.org/techniques/T1218/ | x_refsource_MISC | |
https://www.mcafee.com/support/?articleId=TS103335&page=shell&shell=article-view | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mcafee.com/en-us/antivirus/mcafee-security-scan-plus.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://attack.mitre.org/techniques/T1218/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mcafee.com/support/?articleId=TS103335\u0026page=shell\u0026shell=article-view" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper privilege management vulnerability in McAfee Security Scan Plus (MSS+) before 4.1.262.1 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code due to lack of an integrity check of the configuration file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-18T12:23:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mcafee.com/en-us/antivirus/mcafee-security-scan-plus.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://attack.mitre.org/techniques/T1218/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mcafee.com/support/?articleId=TS103335\u0026page=shell\u0026shell=article-view" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-37025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper privilege management vulnerability in McAfee Security Scan Plus (MSS+) before 4.1.262.1 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code due to lack of an integrity check of the configuration file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mcafee.com/en-us/antivirus/mcafee-security-scan-plus.html", "refsource": "MISC", "url": "https://www.mcafee.com/en-us/antivirus/mcafee-security-scan-plus.html" }, { "name": "https://attack.mitre.org/techniques/T1218/", "refsource": "MISC", "url": "https://attack.mitre.org/techniques/T1218/" }, { "name": "https://www.mcafee.com/support/?articleId=TS103335\u0026page=shell\u0026shell=article-view", "refsource": "MISC", "url": "https://www.mcafee.com/support/?articleId=TS103335\u0026page=shell\u0026shell=article-view" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-37025", "datePublished": "2022-08-18T12:23:57", "dateReserved": "2022-07-29T00:00:00", "dateUpdated": "2024-08-03T10:21:32.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-8992 (GCVE-0-2015-8992)
Vulnerability from cvelistv5
Published
2017-03-14 22:00
Modified
2024-08-06 08:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Malicious file execution vulnerability
Summary
Malicious file execution vulnerability in Intel Security WebAdvisor before 4.0.2, 4.0.1 and 3.7.2 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.
References
▼ | URL | Tags |
---|---|---|
https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel | WebAdvisor |
Version: before 4.0.2, 4.0.1 and 3.7.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:36:31.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WebAdvisor", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before 4.0.2, 4.0.1 and 3.7.2" } ] } ], "datePublic": "2015-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Malicious file execution vulnerability in Intel Security WebAdvisor before 4.0.2, 4.0.1 and 3.7.2 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious file execution vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-14T21:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2015-8992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WebAdvisor", "version": { "version_data": [ { "version_value": "before 4.0.2, 4.0.1 and 3.7.2" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Malicious file execution vulnerability in Intel Security WebAdvisor before 4.0.2, 4.0.1 and 3.7.2 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious file execution vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462", "refsource": "MISC", "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2015-8992", "datePublished": "2017-03-14T22:00:00", "dateReserved": "2017-02-27T00:00:00", "dateUpdated": "2024-08-06T08:36:31.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8026 (GCVE-0-2016-8026)
Vulnerability from cvelistv5
Published
2017-03-14 22:00
Modified
2024-08-06 02:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Arbitrary command execution vulnerability
Summary
Arbitrary command execution vulnerability in Intel Security McAfee Security Scan Plus (SSP) 3.11.469 and earlier allows authenticated users to gain elevated privileges via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98068 | vdb-entry, x_refsource_BID | |
https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102614 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel | McAfee Security Scan Plus (SSP) |
Version: 3.11.469 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:13:21.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98068", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98068" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102614" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "McAfee Security Scan Plus (SSP)", "vendor": "Intel", "versions": [ { "status": "affected", "version": "3.11.469 and earlier" } ] } ], "datePublic": "2016-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Arbitrary command execution vulnerability in Intel Security McAfee Security Scan Plus (SSP) 3.11.469 and earlier allows authenticated users to gain elevated privileges via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary command execution vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-01T09:57:02", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "98068", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98068" }, { "tags": [ "x_refsource_MISC" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102614" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2016-8026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "McAfee Security Scan Plus (SSP)", "version": { "version_data": [ { "version_value": "3.11.469 and earlier" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Arbitrary command execution vulnerability in Intel Security McAfee Security Scan Plus (SSP) 3.11.469 and earlier allows authenticated users to gain elevated privileges via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary command execution vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "98068", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98068" }, { "name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102614", "refsource": "MISC", "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102614" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2016-8026", "datePublished": "2017-03-14T22:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T02:13:21.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2017-03-14 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
Malicious file execution vulnerability in Intel Security WebAdvisor before 4.0.2, 4.0.1 and 3.7.2 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mcafee | security_webadvisor | 3.7.2 | |
mcafee | security_webadvisor | 4.0.1 | |
mcafee | security_webadvisor | 4.0.2 | |
mcafee | cloud_av | - | |
mcafee | security_scan_plus | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:3.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "0BB888A8-EE45-4DF3-BD5B-1FB4B18DDC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "93820F52-CCB6-4999-948D-3D2120622EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8598A38-6CE3-4E06-A3AF-FB7CFFE32E60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:cloud_av:-:*:*:*:*:*:*:*", "matchCriteriaId": "9555C8AA-3873-4377-9CE9-FDE9C3D72E08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_scan_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "39058A15-0DFB-4B45-8F60-054D9E18F236", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Malicious file execution vulnerability in Intel Security WebAdvisor before 4.0.2, 4.0.1 and 3.7.2 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de archivos maliciosos en Intel Security WebAdvisor en versiones anteriores a 4.0.2, 4.0.1 y 3.7.2 permite a atacantes hacer que el producto sea moment\u00e1neamente vulnerable a trav\u00e9s de la ejecuci\u00f3n de malware preexistente espec\u00edficamente manipulado durante la instalaci\u00f3n o desinstalaci\u00f3n, pero no durante el funcionamiento normal." } ], "id": "CVE-2015-8992", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-14T22:59:00.540", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-14 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
Arbitrary command execution vulnerability in Intel Security McAfee Security Scan Plus (SSP) 3.11.469 and earlier allows authenticated users to gain elevated privileges via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mcafee | security_scan_plus | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:security_scan_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "904186C0-4D14-4874-B9E9-736CAF8B7996", "versionEndIncluding": "3.11.469", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Arbitrary command execution vulnerability in Intel Security McAfee Security Scan Plus (SSP) 3.11.469 and earlier allows authenticated users to gain elevated privileges via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de comandos arbitrarios en Intel Security McAfee Security Scan Plus (SSP) 3.11.469 y versiones anteriores permite a usuarios autenticados obtener privilegios elevados a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2016-8026", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-14T22:59:01.167", "references": [ { "source": "secure@intel.com", "url": "http://www.securityfocus.com/bid/98068" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/98068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102614" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-18 13:15
Modified
2024-11-21 07:14
Severity ?
Summary
An improper privilege management vulnerability in McAfee Security Scan Plus (MSS+) before 4.1.262.1 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code due to lack of an integrity check of the configuration file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mcafee | security_scan_plus | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:security_scan_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9CE715F-32EF-476A-AAF5-22F3A6B936F3", "versionEndExcluding": "4.1.262.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper privilege management vulnerability in McAfee Security Scan Plus (MSS+) before 4.1.262.1 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code due to lack of an integrity check of the configuration file." }, { "lang": "es", "value": "Una vulnerabilidad de administraci\u00f3n de privilegios inapropiada en McAfee Security Scan Plus (MSS+) versiones anteriores a 4.1.262.1 podr\u00eda permitir a un usuario local modificar un archivo de configuraci\u00f3n y llevar a cabo un ataque de tipo LOLBin (Living off the land). Esto pod\u00eda resultar en que el usuario consiguiera permisos elevados y pudiera ejecutar c\u00f3digo arbitrario debido a una falta de comprobaci\u00f3n de la integridad del archivo de configuraci\u00f3n." } ], "id": "CVE-2022-37025", "lastModified": "2024-11-21T07:14:18.670", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-18T13:15:08.010", "references": [ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://attack.mitre.org/techniques/T1218/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.mcafee.com/en-us/antivirus/mcafee-security-scan-plus.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.mcafee.com/support/?articleId=TS103335\u0026page=shell\u0026shell=article-view" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://attack.mitre.org/techniques/T1218/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.mcafee.com/en-us/antivirus/mcafee-security-scan-plus.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.mcafee.com/support/?articleId=TS103335\u0026page=shell\u0026shell=article-view" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-01 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
A Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://service.mcafee.com/FAQDocument.aspx?lc=1033&id=TS102723 | Vendor Advisory | |
secure@intel.com | http://www.securityfocus.com/bid/100100 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://service.mcafee.com/FAQDocument.aspx?lc=1033&id=TS102723 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100100 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mcafee | livesafe | * | |
mcafee | security_scan_plus | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:livesafe:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D213D39-7A5C-4A34-85EF-7F5D1665524C", "versionEndIncluding": "16.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:security_scan_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "99BCB455-ACAD-444C-B5E1-25A71521E920", "versionEndIncluding": "3.11.599.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en el mecanismo de autenticaci\u00f3n no basado en certificados en McAfee Live Safe en versiones anteriores a la 16.0.3 y McAfee Security Scan Plus (MSS+) en versiones anteriores a la 3.11.599.3 permite que los atacantes en red lleven a cabo la ejecuci\u00f3n de un archivo malicioso mediante una respuesta backend HTTP." } ], "id": "CVE-2017-3897", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-01T13:29:00.507", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "http://service.mcafee.com/FAQDocument.aspx?lc=1033\u0026id=TS102723" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://service.mcafee.com/FAQDocument.aspx?lc=1033\u0026id=TS102723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100100" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-14 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mcafee | security_webadvisor | 3.7.2 | |
mcafee | security_webadvisor | 4.0.1 | |
mcafee | security_webadvisor | 4.0.2 | |
mcafee | cloud_av | - | |
mcafee | security_scan_plus | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:3.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "0BB888A8-EE45-4DF3-BD5B-1FB4B18DDC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "93820F52-CCB6-4999-948D-3D2120622EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8598A38-6CE3-4E06-A3AF-FB7CFFE32E60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:cloud_av:-:*:*:*:*:*:*:*", "matchCriteriaId": "9555C8AA-3873-4377-9CE9-FDE9C3D72E08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_scan_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "39058A15-0DFB-4B45-8F60-054D9E18F236", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de archivos maliciosos en Intel Security CloudAV (Beta) en versiones anteriores a 0.5.0.151.3 permite a atacantes hacer que el producto sea moment\u00e1neamente vulnerable a trav\u00e9s de la ejecuci\u00f3n de malware preexistente espec\u00edficamente manipulado durante la instalaci\u00f3n o desinstalaci\u00f3n, pero no durante el funcionamiento normal." } ], "id": "CVE-2015-8993", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-14T22:59:00.570", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-14 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
Malicious file execution vulnerability in Intel Security McAfee Security Scan+ (MSS+) before 3.11.266.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mcafee | security_webadvisor | 3.7.2 | |
mcafee | security_webadvisor | 4.0.1 | |
mcafee | security_webadvisor | 4.0.2 | |
mcafee | cloud_av | - | |
mcafee | security_scan_plus | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:3.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "0BB888A8-EE45-4DF3-BD5B-1FB4B18DDC49", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "93820F52-CCB6-4999-948D-3D2120622EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_webadvisor:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8598A38-6CE3-4E06-A3AF-FB7CFFE32E60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:cloud_av:-:*:*:*:*:*:*:*", "matchCriteriaId": "9555C8AA-3873-4377-9CE9-FDE9C3D72E08", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:security_scan_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "39058A15-0DFB-4B45-8F60-054D9E18F236", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Malicious file execution vulnerability in Intel Security McAfee Security Scan+ (MSS+) before 3.11.266.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de archivos maliciosos en Intel Security McAfee Security Scan+ (MSS+) en versiones anteriores a 3.11.266.3 permite a los atacantes hacer que el producto sea moment\u00e1neamente vulnerable a trav\u00e9s de la ejecuci\u00f3n de malware espec\u00edfico preexistente durante la instalaci\u00f3n o desinstalaci\u00f3n, pero no durante el funcionamiento normal." } ], "id": "CVE-2015-8991", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-14T22:59:00.507", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-14 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mcafee | security_scan_plus | * | |
microsoft | windows_10 | * | |
microsoft | windows_7 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:security_scan_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F258E76-4FC4-4E2D-B360-57F5CE9D0E2E", "versionEndIncluding": "3.11.376", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system." }, { "lang": "es", "value": "Vulnerabilidad de escalada de privilegios en Windows 7 y Windows 10 en McAfee Security Scan Plus (SSP) 3.11.376 permite a atacantes cargar un reemplazo del archivo version.dll a trav\u00e9s de McAfee McUICnt.exe en un sistema Windows." } ], "id": "CVE-2016-8008", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-14T22:59:00.697", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102593" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }