cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-1257,https://securityvulnerability.io/vulnerability/CVE-2022-1257,Improper Verification of Cryptographic Signature by McAfee Agent,"Insecure storage of sensitive information vulnerability in MA for Linux, macOS, and Windows prior to 5.7.6 allows a local user to gain access to sensitive information through storage in ma.db. The sensitive information has been moved to encrypted database files.","Mcafee,llc",Mcafee Agent,6.1,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-04-14T13:50:18.000Z,0 CVE-2022-1258,https://securityvulnerability.io/vulnerability/CVE-2022-1258,SQL injection vulnerability in McAfee Agent's ePO extension,"A blind SQL injection vulnerability in the ePolicy Orchestrator (ePO) extension of MA prior to 5.7.6 can be exploited by an authenticated administrator on ePO to perform arbitrary SQL queries in the back-end database, potentially leading to command execution on the server.","McAfee,LLC",McAfee Agent ePO extension,7.2,HIGH,0.0010100000072270632,false,,false,false,false,,,false,false,,2022-04-14T13:50:12.000Z,0 CVE-2022-1256,https://securityvulnerability.io/vulnerability/CVE-2022-1256,Improper Privilege Management in McAfee Agent for Windows,A local privilege escalation vulnerability in MA for Windows prior to 5.7.6 allows a local low privileged user to gain system privileges through running the repair functionality. Temporary file actions were performed on the local user's %TEMP% directory with System privileges through manipulation of symbolic links.,"Mcafee,llc",Mcafee Agent For Windows,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-04-14T13:45:17.000Z,0 CVE-2022-0166,https://securityvulnerability.io/vulnerability/CVE-2022-0166,Privilege escalation vulnerability in McAfee Agent,A privilege escalation vulnerability in the McAfee Agent prior to 5.7.5. McAfee Agent uses openssl.cnf during the build process to specify the OPENSSLDIR variable as a subdirectory within the installation directory. A low privilege user could have created subdirectories and executed arbitrary code with SYSTEM privileges by creating the appropriate pathway to the specifically created malicious openssl.cnf file.,"McAfee,LLC",McAfee Agent for Windows,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-19T11:05:11.000Z,0 CVE-2021-31854,https://securityvulnerability.io/vulnerability/CVE-2021-31854,Code injection vulnerability in McAfee Agent,"A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges. ","Mcafee,llc",Mcafee Agent For Windows,7.7,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2022-01-19T11:00:16.000Z,0 CVE-2021-31836,https://securityvulnerability.io/vulnerability/CVE-2021-31836,Improper Privilege Management in MA for Windows,Improper privilege management vulnerability in maconfig for McAfee Agent for Windows prior to 5.7.4 allows a local user to gain access to sensitive information. The utility was able to be run from any location on the file system and by a low privileged user.,"Mcafee,llc",Mcafee Agent For Windows,5.6,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-09-22T13:30:14.000Z,0 CVE-2021-31847,https://securityvulnerability.io/vulnerability/CVE-2021-31847,Improper privilege management in repair process of MA for Windows,"Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature.","Mcafee,llc",Mcafee Agent For Windows,8.2,HIGH,0.0008500000112690032,false,,false,false,false,,,false,false,,2021-09-22T13:25:18.000Z,0 CVE-2021-31841,https://securityvulnerability.io/vulnerability/CVE-2021-31841,DLL side loading vulnerability in MA for Windows,"A DLL sideloading vulnerability in McAfee Agent for Windows prior to 5.7.4 could allow a local user to perform a DLL sideloading attack with an unsigned DLL with a specific name and in a specific location. This would result in the user gaining elevated permissions and the ability to execute arbitrary code as the system user, through not checking the DLL signature.","Mcafee,llc",Mcafee Agent For Windows,8.2,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-09-22T13:25:11.000Z,0 CVE-2021-31840,https://securityvulnerability.io/vulnerability/CVE-2021-31840,DLL preload vulnerability in McAfee Agent for Windows,"A vulnerability in the preloading mechanism of specific dynamic link libraries in McAfee Agent for Windows prior to 5.7.3 could allow an authenticated, local attacker to perform a DLL preloading attack with unsigned DLLs. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. This would result in the user gaining elevated permissions and being able to execute arbitrary code.","Mcafee,llc",Mcafee Agent For Windows,7.3,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-06-10T16:20:12.000Z,0 CVE-2021-31839,https://securityvulnerability.io/vulnerability/CVE-2021-31839,Incorrect permissions on McAfee Agent for Windows event folder,Improper privilege management vulnerability in McAfee Agent for Windows prior to 5.7.3 allows a local user to modify event information in the MA event folder. This allows a local user to either add false events or remove events from the event logs prior to them being sent to the ePO server.,"Mcafee,llc",Mcafee Agent For Windows,4.8,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-06-10T16:15:13.000Z,0 CVE-2020-7343,https://securityvulnerability.io/vulnerability/CVE-2020-7343,Improper Authorization vulnerability in MA,Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.,"Mcafee, Llc",Mcafee Agent,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-01-18T13:15:00.000Z,0 CVE-2019-3613,https://securityvulnerability.io/vulnerability/CVE-2019-3613,DLL search order hijacking in MA,DLL Search Order Hijacking vulnerability in McAfee Agent (MA) prior to 5.6.4 allows attackers with local access to execute arbitrary code via execution from a compromised folder.,"Mcafee, Llc",Mcafee Agent (ma),5.9,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2020-06-10T11:15:00.000Z,0 CVE-2020-7253,https://securityvulnerability.io/vulnerability/CVE-2020-7253,Improper access control vulnerability in McAfee Agent,Improper access control vulnerability in masvc.exe in McAfee Agent (MA) prior to 5.6.4 allows local users with administrator privileges to disable self-protection via a McAfee supplied command-line utility.,"Mcafee, Llc",Mcafee Agent (ma),5.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2020-03-12T11:15:00.000Z,0 CVE-2019-3592,https://securityvulnerability.io/vulnerability/CVE-2019-3592,MA for Windows update addresses weak directory permissions,"Privilege escalation vulnerability in McAfee Agent (MA) before 5.6.1 HF3, allows local administrator users to potentially disable some McAfee processes by manipulating the MA directory control and placing a carefully constructed file in the MA directory.","Mcafee, Llc",Mcafee Agent (ma),7.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-07-18T18:04:02.000Z,0 CVE-2019-3599,https://securityvulnerability.io/vulnerability/CVE-2019-3599,McAfee Agent update fixes an Information Disclosure vulnerability,Information Disclosure vulnerability in Remote logging (which is disabled by default) in McAfee Agent (MA) 5.x allows remote unauthenticated users to access sensitive information via remote logging when it is enabled.,"Mcafee, Llc",Mcafee Agent (ma),6.5,MEDIUM,0.0039900001138448715,false,,false,false,false,,,false,false,,2019-02-28T16:00:00.000Z,0 CVE-2019-3598,https://securityvulnerability.io/vulnerability/CVE-2019-3598,McAfee Agent update fixes a vulnerability in handling UDP requests,Buffer Access with Incorrect Length Value in McAfee Agent (MA) 5.x allows remote unauthenticated users to potentially cause a denial of service via specifically crafted UDP packets.,"Mcafee, Llc",Mcafee Agent (ma),5.3,MEDIUM,0.002589999930933118,false,,false,false,false,,,false,false,,2019-02-28T16:00:00.000Z,0 CVE-2018-6707,https://securityvulnerability.io/vulnerability/CVE-2018-6707,McAfee Agent Insecure usage of temporary files vulnerability,"Denial of Service through Resource Depletion vulnerability in the agent in non-Windows McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to cause DoS, unexpected behavior, or potentially unauthorized code execution via knowledge of the internal trust mechanism.",Mcafee,Mcafee Agent (ma) Non-windows Non-windows Versions,3.7,LOW,0.0004199999966658652,false,,false,false,false,,,false,false,,2018-12-14T00:29:00.000Z,0 CVE-2018-6706,https://securityvulnerability.io/vulnerability/CVE-2018-6706,"McAfee Agent (MA) non-Windows versions incorrect use of temporary file vulnerability ","Insecure handling of temporary files in non-Windows McAfee Agent 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows an Unprivileged User to introduce custom paths during agent installation in Linux via unspecified vectors.",Mcafee,Mcafee Agent (ma) For Linux,2.3,LOW,0.0009699999936856329,false,,false,false,false,,,false,false,,2018-12-12T23:00:00.000Z,0 CVE-2018-6704,https://securityvulnerability.io/vulnerability/CVE-2018-6704,"McAfee Agent for Linux Privilege Escalation vulnerability ","Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions.",Mcafee,Mcafee Agent (ma) For Linux,4.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2018-12-12T20:00:00.000Z,0 CVE-2018-6705,https://securityvulnerability.io/vulnerability/CVE-2018-6705,"McAfee Agent (MA) for Linux Privilege Escalation vulnerability ","Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions.",Mcafee,Mcafee Agent (ma) For Linux,2.3,LOW,0.0004199999966658652,false,,false,false,false,,,false,false,,2018-12-12T20:00:00.000Z,0 CVE-2018-6703,https://securityvulnerability.io/vulnerability/CVE-2018-6703,Remote Logging functionality had a use after free vulnerability in McAfee Agent,Use After Free in Remote logging (which is disabled by default) in McAfee McAfee Agent (MA) 5.x prior to 5.6.0 allows remote unauthenticated attackers to cause a Denial of Service and potentially a remote code execution via a specially crafted HTTP header sent to the logging service.,"Mcafee, Llc",Mcafee Agent,9.8,CRITICAL,0.012330000288784504,false,,false,false,false,,,false,false,,2018-12-11T23:00:00.000Z,0 CVE-2016-3984,https://securityvulnerability.io/vulnerability/CVE-2016-3984,,"The McAfee VirusScan Console (mcconsol.exe) in McAfee Active Response (MAR) before 1.1.0.161, Agent (MA) 5.x before 5.0.2 Hotfix 1110392 (5.0.2.333), Data Exchange Layer 2.x (DXL) before 2.0.1.140.1, Data Loss Prevention Endpoint (DLPe) 9.3 before Patch 6 and 9.4 before Patch 1 HF3, Device Control (MDC) 9.3 before Patch 6 and 9.4 before Patch 1 HF3, Endpoint Security (ENS) 10.x before 10.1, Host Intrusion Prevention Service (IPS) 8.0 before 8.0.0.3624, and VirusScan Enterprise (VSE) 8.8 before P7 (8.8.0.1528) on Windows allows local administrators to bypass intended self-protection rules and disable the antivirus engine by modifying registry keys.",Mcafee,"Data Loss Prevention Endpoint,Agent,Virusscan Enterprise,Host Intrusion Prevention,Active Response,Data Exchange Layer,Endpoint Security",5.1,MEDIUM,0.0009699999936856329,false,,false,false,false,,,false,false,,2016-04-08T15:00:00.000Z,0 CVE-2015-7237,https://securityvulnerability.io/vulnerability/CVE-2015-7237,,Directory traversal vulnerability in the remote log viewing functionality in McAfee Agent (MA) 5.x before 5.0.2 allows remote attackers to obtain sensitive information via unspecified vectors.,Mcafee,Mcafee Agent,,,0.004600000102072954,false,,false,false,false,,,false,false,,2015-09-18T14:59:00.000Z,0 CVE-2015-2053,https://securityvulnerability.io/vulnerability/CVE-2015-2053,,"The log viewer in McAfee Agent (MA) before 4.8.0 Patch 3 and 5.0.0, when the ""Accept connections only from the ePO server"" option is disabled, allows remote attackers to conduct clickjacking attacks via a crafted web page, aka an ""http-generic-click-jacking"" vulnerability.",Mcafee,Mcafee Agent,,,0.002959999954327941,false,,false,false,false,,,false,false,,2015-02-23T17:00:00.000Z,0 CVE-2013-3627,https://securityvulnerability.io/vulnerability/CVE-2013-3627,,FrameworkService.exe in McAfee Framework Service in McAfee Managed Agent (MA) before 4.5.0.1927 and 4.6 before 4.6.0.3258 allows remote attackers to cause a denial of service (service crash) via a malformed HTTP request.,Mcafee,Agent,,,0.0020200000144541264,false,,false,false,false,,,false,false,,2013-10-05T10:55:00.000Z,0