Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| McAfee LLC | McAfee Endpoint Security (ENS) | 10.x ~ 10.7.0 April 2020 Update | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2020-7250 | 8.2 HIGH | ENS symbolic link log file manipulation vulnerability |
| CVE-2020-7278 | 7.4 HIGH | McAfee firewall rules not enforced correctly |
| CVE-2020-7277 | 6.8 MEDIUM | McAfee processes not protected |
| CVE-2020-7273 | 6.7 MEDIUM | Autorun registry bypass |
| CVE-2020-7259 | 6.6 MEDIUM | Unsigned executable vulnerability in ENS can be used to bypass intended self-protection ru |
| CVE-2020-7274 | 6.6 MEDIUM | ENS elevated permissions vulnerability |
| CVE-2020-7276 | 6.4 MEDIUM | Unrestricted Policy Management using MfeUpgradeTool.exe |
| CVE-2020-7261 | 6.1 MEDIUM | Buffer overwrite in ENS allowed to bypass AMSI protection |
| CVE-2020-7275 | 4.8 MEDIUM | Unquoted service paths for some McAfee ENS files |
| CVE-2020-7255 | 3.9 LOW | Privilege Escalation vulnerability in ENS |
No comments yet