The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of VirusScan

McAfee VirusScan Enterprise: memory corruption via IE Scriptscan COM Object
An attacker can generate a memory corruption via IE Scriptscan COM Object of McAfee VirusScan Enterprise, in order to trigger a denial of service, and possibly to run code...
CVE-2016-8030, SB10194, VIGILANCE-VUL-22423
McAfee Virus Scan Enterprise: privilege escalation via Registry Debugger
An attacker can bypass restrictions via Registry Debugger of McAfee Virus Scan Enterprise, in order to escalate his privileges...
CVE-2017-4028, SB10193, VIGILANCE-VUL-22299
Antivirus: privilege escalation via Microsoft Application Verifier
An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges...
1116957, CVE-2017-5565, CVE-2017-5566, CVE-2017-5567, CVE-2017-6186, CVE-2017-6417, VIGILANCE-VUL-22211
McAfee VirusScan Enterprise for Windows: memory corruption via scriptproxy
An attacker can generate a memory corruption via scriptproxy of McAfee VirusScan Enterprise for Windows, in order to trigger a denial of service, and possibly to run code...
VIGILANCE-VUL-21380, VU#535111
McAfee VirusScan Enterprise: multiple vulnerabilities
An attacker can use several vulnerabilities of McAfee VirusScan Enterprise...
CERTFR-2016-AVI-408, CVE-2016-8016, CVE-2016-8017, CVE-2016-8018, CVE-2016-8019, CVE-2016-8020, CVE-2016-8021, CVE-2016-8022, CVE-2016-8023, CVE-2016-8024, CVE-2016-8025, SB10181, VIGILANCE-VUL-21358, VU#245327, VU#535111
McAfee VirusScan Enterprise: unlocking console
A local attacker can bypass the password protection of the McAfee VirusScan Enterprise console, in order to alter the product configuration...
CVE-2016-4534, SB10158, VIGILANCE-VUL-19520
McAfee VirusScan Enterprise: bypassing of self-protection
A local attacker can bypass the self-protection of McAfee VirusScan Enterprise, in order to elevate his privileges...
CVE-2016-3984, SB10151, VIGILANCE-VUL-19035
glibc: buffer overflow of getaddrinfo
An attacker, who owns a malicious DNS server, can reply with long data to a client application using the getaddrinfo() function of the glibc, in order to trigger a denial of service, and possibly to run code in the client application...
046146, 046151, 046153, 046155, 046158, 1977665, 478832, 479427, 479906, 480572, 480707, 480708, ARUBA-PSA-2016-001, BSA-2016-003, BSA-2016-004, CERTFR-2016-AVI-066, CERTFR-2016-AVI-071, CERTFR-2017-AVI-012, CERTFR-2017-AVI-022, cisco-sa-20160218-glibc, CTX206991, CVE-2015-7547, DSA-2019-197, ESA-2016-020, ESA-2016-027, ESA-2016-028, ESA-2016-029, ESA-2016-030, FEDORA-2016-0480defc94, FEDORA-2016-0f9e9a34ce, JSA10774, KB #4858, openSUSE-SU-2016:0490-1, openSUSE-SU-2016:0510-1, openSUSE-SU-2016:0511-1, openSUSE-SU-2016:0512-1, PAN-SA-2016-0021, RHSA-2016:0175-01, RHSA-2016:0176-01, RHSA-2016:0225-01, SA114, SB10150, SOL47098834, SSA:2016-054-02, SSA-301706, SUSE-SU-2016:0470-1, SUSE-SU-2016:0471-1, SUSE-SU-2016:0472-1, SUSE-SU-2016:0473-1, USN-2900-1, VIGILANCE-VUL-18956, VMSA-2016-0002, VMSA-2016-0002.1, VN-2016-003
glibc: denial of service via calloc
An attacker can use an error in the calloc() implementation by the glibc, in order to trigger a denial of service, or to obtain sensitive information...
CVE-2015-5229, RHSA-2016:0176-01, SB10150, VIGILANCE-VUL-18959
VirusScan Enterprise: bypassing BOP
An attacker can use the BOP feature of VirusScan Enterprise, in order to ease the development of an exploit for a vulnerability in a software protected by BOP...
CVE-2015-8577, SB10142, VIGILANCE-VUL-18482
Our database contains other pages. You can request a free trial to read them.

Display information about VirusScan: