# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2023-0978 |
77 |
|
Exec Code |
2023-03-13 |
2023-03-17 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack |
2 |
CVE-2023-0221 |
269 |
|
Bypass |
2023-01-13 |
2023-01-23 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
Product security bypass vulnerability in ACC prior to version 8.3.4 allows a locally logged-in attacker with administrator privileges to bypass the execution controls provided by ACC using the utilman program. |
3 |
CVE-2022-43751 |
427 |
|
Exec Code |
2022-11-23 |
2022-11-28 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
McAfee Total Protection prior to version 16.0.49 contains an uncontrolled search path element vulnerability due to the use of a variable pointing to a subdirectory that may be controllable by an unprivileged user. This may have allowed the unprivileged user to execute arbitrary code with system privileges. |
4 |
CVE-2022-37025 |
269 |
|
Exec Code +Priv |
2022-08-18 |
2022-08-19 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An improper privilege management vulnerability in McAfee Security Scan Plus (MSS+) before 4.1.262.1 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code due to lack of an integrity check of the configuration file. |
5 |
CVE-2022-3339 |
79 |
|
XSS +Info |
2022-10-18 |
2022-10-20 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 Update 14 allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO. |
6 |
CVE-2022-3338 |
611 |
|
|
2022-10-18 |
2022-10-20 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
An External XML entity (XXE) vulnerability in ePO prior to 5.10 Update 14 can lead to an unauthenticated remote attacker to potentially trigger a Server Side Request Forgery attack. This can be exploited by mimicking the Agent Handler call to ePO and passing the carefully constructed XML file through the API. |
7 |
CVE-2022-2313 |
427 |
|
Exec Code |
2022-07-27 |
2022-08-02 |
0.0 |
None |
??? |
??? |
??? |
??? |
??? |
??? |
A DLL hijacking vulnerability in the MA Smart Installer for Windows prior to 5.7.7, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL into the folder from where the Smart installer is being executed. |
8 |
CVE-2022-1824 |
427 |
|
Exec Code |
2022-06-20 |
2022-06-28 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
An uncontrolled search path vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local attacker to perform a sideloading attack by using a specific file name. This could result in the user gaining elevated permissions and being able to execute arbitrary code as there were insufficient checks on the executable being signed by McAfee. |
9 |
CVE-2022-1823 |
269 |
|
Exec Code +Priv |
2022-06-20 |
2022-06-28 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Improper privilege management vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code, through not correctly checking the integrity of the configuration file. |
10 |
CVE-2022-1258 |
89 |
|
Exec Code Sql |
2022-04-14 |
2022-04-23 |
6.0 |
None |
Remote |
Medium |
??? |
Partial |
Partial |
Partial |
A blind SQL injection vulnerability in the ePolicy Orchestrator (ePO) extension of MA prior to 5.7.6 can be exploited by an authenticated administrator on ePO to perform arbitrary SQL queries in the back-end database, potentially leading to command execution on the server. |
11 |
CVE-2022-1257 |
922 |
|
|
2022-04-14 |
2022-04-23 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
Insecure storage of sensitive information vulnerability in MA for Linux, macOS, and Windows prior to 5.7.6 allows a local user to gain access to sensitive information through storage in ma.db. The sensitive information has been moved to encrypted database files. |
12 |
CVE-2022-1256 |
269 |
|
+Priv |
2022-04-14 |
2022-04-23 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
A local privilege escalation vulnerability in MA for Windows prior to 5.7.6 allows a local low privileged user to gain system privileges through running the repair functionality. Temporary file actions were performed on the local user's %TEMP% directory with System privileges through manipulation of symbolic links. |
13 |
CVE-2022-1254 |
601 |
|
|
2022-04-20 |
2022-04-29 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
A URL redirection vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.9, 9.x prior to 9.2.20, 8.x prior to 8.2.27, and 7.x prior to 7.8.2.31, and controlled release 11.x prior to 11.1.3 allows a remote attacker to redirect a user to a malicious website controlled by the attacker. This is possible because SWG incorrectly creates a HTTP redirect response when a user clicks a carefully constructed URL. Following the redirect response, the new request is still filtered by the SWG policy. |
14 |
CVE-2022-0862 |
522 |
|
|
2022-03-23 |
2022-03-29 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A lack of password change protection vulnerability in a depreciated API of McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote attacker to change the password of a compromised session without knowing the existing user's password. This functionality was removed from the User Interface in ePO 10 and the API has now been disabled. Other protection is in place to reduce the likelihood of this being successful through sending a link to a logged in user. |
15 |
CVE-2022-0861 |
611 |
|
|
2022-03-23 |
2022-03-29 |
5.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
None |
A XML Extended entity vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote administrator attacker to upload a malicious XML file through the extension import functionality. The impact is limited to some access to confidential information and some ability to alter data. |
16 |
CVE-2022-0859 |
522 |
|
|
2022-03-23 |
2022-03-29 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a local attacker to point an ePO server to an arbitrary SQL server during the restoration of the ePO server. To achieve this the attacker would have to be logged onto the server hosting the ePO server (restricted to administrators) and to know the SQL server password. |
17 |
CVE-2022-0858 |
79 |
|
XSS +Info |
2022-03-23 |
2022-03-29 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A cross-site scripting (XSS) vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote attacker to potentially obtain access to an ePO administrator's session by convincing the attacker to click on a carefully crafted link. This would lead to limited ability to alter some information in ePO due to the area of the User Interface the vulnerability is present in. |
18 |
CVE-2022-0857 |
79 |
|
XSS +Info |
2022-03-23 |
2022-03-29 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A reflected cross-site scripting (XSS) vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote attacker to potentially obtain access to an ePO administrator's session by convincing the attacker to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO due to the area of the User Interface the vulnerability is present in. |
19 |
CVE-2022-0842 |
89 |
|
Sql +Info |
2022-03-23 |
2022-03-29 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
A blind SQL injection vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote authenticated attacker to potentially obtain information from the ePO database. The data obtained is dependent on the privileges the attacker has and to obtain sensitive data the attacker would require administrator privileges. |
20 |
CVE-2022-0815 |
668 |
|
|
2022-03-10 |
2022-05-10 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Improper access control vulnerability in McAfee WebAdvisor Chrome and Edge browser extensions up to 8.1.0.1895 allows a remote attacker to gain access to McAfee WebAdvisor settings and other details about the user’s system. This could lead to unexpected behaviors including; settings being changed, fingerprinting of the system leading to targeted scams, and not triggering the malicious software if McAfee software is detected. |
21 |
CVE-2022-0166 |
269 |
|
Exec Code |
2022-01-19 |
2022-01-25 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
A privilege escalation vulnerability in the McAfee Agent prior to 5.7.5. McAfee Agent uses openssl.cnf during the build process to specify the OPENSSLDIR variable as a subdirectory within the installation directory. A low privilege user could have created subdirectories and executed arbitrary code with SYSTEM privileges by creating the appropriate pathway to the specifically created malicious openssl.cnf file. |
22 |
CVE-2022-0129 |
427 |
|
+Priv |
2022-01-11 |
2022-01-21 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Uncontrolled search path element vulnerability in McAfee TechCheck prior to 4.0.0.2 allows a local administrator to load their own Dynamic Link Library (DLL) gaining elevation of privileges to system user. This was achieved through placing the malicious DLL in the same directory that the process was run from. |
23 |
CVE-2021-33037 |
444 |
|
|
2021-07-12 |
2022-10-27 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding. |
24 |
CVE-2021-31854 |
78 |
|
Exec Code |
2022-01-19 |
2023-02-02 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges. |
25 |
CVE-2021-31853 |
427 |
|
Exec Code |
2021-11-10 |
2021-11-13 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
DLL Search Order Hijacking Vulnerability in McAfee Drive Encryption (MDE) prior to 7.3.0 HF2 (7.3.0.183) allows local users to execute arbitrary code and escalate privileges via execution from a compromised folder. |
26 |
CVE-2021-31852 |
79 |
|
XSS |
2021-11-23 |
2021-11-29 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A Reflected Cross-Site Scripting vulnerability in McAfee Policy Auditor prior to 6.5.2 allows a remote unauthenticated attacker to inject arbitrary web script or HTML via the UID request parameter. The malicious script is reflected unmodified into the Policy Auditor web-based interface which could lead to the extract of end user session token or login credentials. These may be used to access additional security-critical applications or conduct arbitrary cross-domain requests. |
27 |
CVE-2021-31851 |
79 |
|
XSS |
2021-11-23 |
2021-11-29 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A Reflected Cross-Site Scripting vulnerability in McAfee Policy Auditor prior to 6.5.2 allows a remote unauthenticated attacker to inject arbitrary web script or HTML via the profileNodeID request parameters. The malicious script is reflected unmodified into the Policy Auditor web-based interface which could lead to the extraction of end user session token or login credentials. These may be used to access additional security-critical applications or conduct arbitrary cross-domain requests. |
28 |
CVE-2021-31849 |
89 |
|
Sql |
2021-11-01 |
2021-11-03 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
SQL injection vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.7.100 allows a remote attacker logged into ePO as an administrator to inject arbitrary SQL into the ePO database through the user management section of the DLP ePO extension. |
29 |
CVE-2021-31848 |
79 |
|
XSS |
2021-11-01 |
2021-11-03 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
Cross site scripting (XSS) vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.7.100 allows a remote attacker to highjack an active DLP ePO administrator session by convincing the logged in administrator to click on a carefully crafted link in the case management part of the DLP ePO extension. |
30 |
CVE-2021-31847 |
347 |
|
Exec Code |
2021-09-22 |
2021-09-29 |
6.9 |
None |
Local |
Medium |
Not required |
Complete |
Complete |
Complete |
Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature. |
31 |
CVE-2021-31845 |
120 |
|
Exec Code Overflow |
2021-09-17 |
2021-10-01 |
6.0 |
None |
Remote |
Medium |
??? |
Partial |
Partial |
Partial |
A buffer overflow vulnerability in McAfee Data Loss Prevention (DLP) Discover prior to 11.6.100 allows an attacker in the same network as the DLP Discover to execute arbitrary code through placing carefully constructed Ami Pro (.sam) files onto a machine and having DLP Discover scan it, leading to remote code execution with elevated privileges. This is caused by the destination buffer being of fixed size and incorrect checks being made on the source size. |
32 |
CVE-2021-31844 |
120 |
|
Exec Code Overflow |
2021-09-17 |
2021-10-01 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
A buffer overflow vulnerability in McAfee Data Loss Prevention (DLP) Endpoint for Windows prior to 11.6.200 allows a local attacker to execute arbitrary code with elevated privileges through placing carefully constructed Ami Pro (.sam) files onto the local system and triggering a DLP Endpoint scan through accessing a file. This is caused by the destination buffer being of fixed size and incorrect checks being made on the source size. |
33 |
CVE-2021-31843 |
59 |
|
|
2021-09-17 |
2023-02-16 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Improper privileges management vulnerability in McAfee Endpoint Security (ENS) Windows prior to 10.7.0 September 2021 Update allows local users to access files which they would otherwise not have access to via manipulating junction links to redirect McAfee folder operations to an unintended location. |
34 |
CVE-2021-31842 |
776 |
|
DoS |
2021-09-17 |
2022-05-10 |
2.1 |
None |
Local |
Low |
Not required |
None |
None |
Partial |
XML Entity Expansion injection vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2021 Update allows a local user to initiate high CPU and memory consumption resulting in a Denial of Service attack through carefully editing the EPDeploy.xml file and then executing the setup process. |
35 |
CVE-2021-31841 |
426 |
|
Exec Code |
2021-09-22 |
2021-09-29 |
6.9 |
None |
Local |
Medium |
Not required |
Complete |
Complete |
Complete |
A DLL sideloading vulnerability in McAfee Agent for Windows prior to 5.7.4 could allow a local user to perform a DLL sideloading attack with an unsigned DLL with a specific name and in a specific location. This would result in the user gaining elevated permissions and the ability to execute arbitrary code as the system user, through not checking the DLL signature. |
36 |
CVE-2021-31840 |
427 |
|
Exec Code |
2021-06-10 |
2021-06-22 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
A vulnerability in the preloading mechanism of specific dynamic link libraries in McAfee Agent for Windows prior to 5.7.3 could allow an authenticated, local attacker to perform a DLL preloading attack with unsigned DLLs. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. This would result in the user gaining elevated permissions and being able to execute arbitrary code. |
37 |
CVE-2021-31839 |
269 |
|
|
2021-06-10 |
2021-06-15 |
2.1 |
None |
Local |
Low |
Not required |
None |
Partial |
None |
Improper privilege management vulnerability in McAfee Agent for Windows prior to 5.7.3 allows a local user to modify event information in the MA event folder. This allows a local user to either add false events or remove events from the event logs prior to them being sent to the ePO server. |
38 |
CVE-2021-31838 |
78 |
|
Exec Code |
2021-06-29 |
2023-02-02 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
A command injection vulnerability in MVISION EDR (MVEDR) prior to 3.4.0 allows an authenticated MVEDR administrator to trigger the EDR client to execute arbitrary commands through PowerShell using the EDR functionality 'execute reaction'. |
39 |
CVE-2021-31837 |
787 |
|
Exec Code Overflow Mem. Corr. |
2021-06-09 |
2021-06-16 |
6.1 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Complete |
Memory corruption vulnerability in the driver file component in McAfee GetSusp prior to 4.0.0 could allow a program being investigated on the local machine to trigger a buffer overflow in GetSusp, leading to the execution of arbitrary code, potentially triggering a BSOD. |
40 |
CVE-2021-31836 |
269 |
|
+Priv |
2021-09-22 |
2021-09-29 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
Improper privilege management vulnerability in maconfig for McAfee Agent for Windows prior to 5.7.4 allows a local user to gain access to sensitive information. The utility was able to be run from any location on the file system and by a low privileged user. |
41 |
CVE-2021-31835 |
79 |
|
XSS |
2021-10-22 |
2021-10-25 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 11 allows ePO administrators to inject arbitrary web script or HTML via a specific parameter where the administrator's entries were not correctly sanitized. |
42 |
CVE-2021-31834 |
79 |
|
XSS |
2021-10-22 |
2021-10-25 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
Stored Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 11 allows ePO administrators to inject arbitrary web script or HTML via multiple parameters where the administrator's entries were not correctly sanitized. |
43 |
CVE-2021-31833 |
269 |
|
Bypass |
2022-01-04 |
2022-01-12 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Potential product security bypass vulnerability in McAfee Application and Change Control (MACC) prior to version 8.3.4 allows a locally logged in attacker to circumvent the application solidification protection provided by MACC, permitting them to run applications that would usually be prevented by MACC. This would require the attacker to rename the specified binary to match name of any configured updater and perform a specific set of steps, resulting in the renamed binary to be to run. |
44 |
CVE-2021-31832 |
79 |
|
Exec Code XSS |
2021-06-09 |
2021-06-22 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
Improper Neutralization of Input in the ePO administrator extension for McAfee Data Loss Prevention (DLP) Endpoint for Windows prior to 11.6.200 allows a remote ePO DLP administrator to inject JavaScript code into the alert configuration text field. This JavaScript will be executed when an end user triggers a DLP policy on their machine. |
45 |
CVE-2021-31831 |
552 |
|
|
2021-06-03 |
2021-06-15 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
Incorrect access to deleted scripts vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote authenticated attacker to gain access to signed SQL scripts which have been marked as deleted or expired within the administrative console. This access was only available through the REST API. |
46 |
CVE-2021-31830 |
79 |
|
XSS |
2021-06-03 |
2021-06-11 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows an administrator to embed JavaScript code when configuring the name of a database to be monitored. This would be triggered when any authorized user logs into the DBSec interface and opens the properties configuration page for this database. |
47 |
CVE-2021-30639 |
755 |
|
DoS |
2021-07-12 |
2022-10-27 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64. |
48 |
CVE-2021-23896 |
319 |
|
|
2021-06-02 |
2021-06-11 |
2.7 |
None |
Local Network |
Low |
??? |
Partial |
None |
None |
Cleartext Transmission of Sensitive Information vulnerability in the administrator interface of McAfee Database Security (DBSec) prior to 4.8.2 allows an administrator to view the unencrypted password of the McAfee Insights Server used to pass data to the Insights Server. This user is restricted to only have access to DBSec data in the Insights Server. |
49 |
CVE-2021-23895 |
502 |
|
|
2021-06-02 |
2021-06-11 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
Deserialization of untrusted data vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote authenticated attacker to create a reverse shell with administrator privileges on the DBSec server via carefully constructed Java serialized object sent to the DBSec server. |
50 |
CVE-2021-23894 |
502 |
|
|
2021-06-02 |
2021-06-11 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
Deserialization of untrusted data vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote unauthenticated attacker to create a reverse shell with administrator privileges on the DBSec server via carefully constructed Java serialized object sent to the DBSec server. |