Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Total_protection
(Mcafee)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 26 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-05-12 | CVE-2021-23891 | Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by impersonating a client token which could lead to the bypassing of MTP self-defense. | Total_protection | 7.8 | ||
2021-10-26 | CVE-2021-23877 | Privilege escalation vulnerability in the Windows trial installer of McAfee Total Protection (MTP) prior to 16.0.34_x may allow a local user to run arbitrary code as the admin user by replacing a specific temporary file created during the installation of the trial version of MTP. | Total_protection | 7.8 | ||
2018-04-03 | CVE-2017-4028 | Maliciously misconfigured registry vulnerability in all Microsoft Windows products in McAfee consumer and corporate products allows an administrator to inject arbitrary code into a debugged McAfee process via manipulation of registry parameters. | Anti\-Virus_plus, Endpoint_security, Host_intrusion_prevention, Internet_security, Total_protection, Virus_scan_enterprise | 4.4 | ||
2019-01-23 | CVE-2019-3587 | DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.18 allows local users to execute arbitrary code via execution from a compromised folder. | Total_protection | 6.5 | ||
2019-01-28 | CVE-2019-3593 | Exploitation of Privilege/Trust vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.R18 allows local users to bypass product self-protection, tamper with policies and product files, and uninstall McAfee software without permission via specially crafted malware. | Total_protection | 7.1 | ||
2019-09-13 | CVE-2019-3646 | DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights. | Total_protection | 6.5 | ||
2019-10-28 | CVE-2019-3636 | A File Masquerade vulnerability in McAfee Total Protection (MTP) version 16.0.R21 and earlier in Windows client allowed an attacker to read the plaintext list of AV-Scan exclusion files from the Windows registry, and to possibly replace excluded files with potential malware without being detected. | Total_protection | 7.8 | ||
2019-11-13 | CVE-2019-3648 | A Privilege Escalation vulnerability in the Microsoft Windows client in McAfee Total Protection 16.0.R22 and earlier allows administrators to execute arbitrary code via carefully placing malicious files in specific locations protected by administrator permission. | Anti\-Virus_plus, Internet_security, Total_protection | 6.7 | ||
2020-06-10 | CVE-2019-3617 | Privilege escalation vulnerability in McAfee Total Protection (ToPS) for Mac OS prior to 4.6 allows local users to gain root privileges via incorrect protection of temporary files. | Total_protection | 8.2 | ||
2009-04-30 | CVE-2009-1348 | The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive. | Active_virus_defense, Active_virusscan, Email_gateway, Internet_security_suite, Securityshield_for_email_servers, Securityshield_for_microsoft_isa_server, Securityshield_for_microsoft_sharepoint, Total_protection, Total_protection_for_endpoint, Virusscan_commandline, Virusscan_enterprise, Virusscan_plus, Virusscan_usb | N/A |