Логотип exploitDog
bind:CVE-2021-31854
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-31854

Количество 3

Количество 3

nvd логотип

CVE-2021-31854

около 4 лет назад

A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges.

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-5jww-7299-jr22

около 4 лет назад

A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2022-00532

около 4 лет назад

Уязвимость исполняемого файла cleanup.exe антивирусного программного средства McAfee Agent, позволяющая нарушителю выполнить произвольные команды

CVSS3: 7.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-31854

A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges.

CVSS3: 7.7
0%
Низкий
около 4 лет назад
github логотип
GHSA-5jww-7299-jr22

A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges.

CVSS3: 7.8
0%
Низкий
около 4 лет назад
fstec логотип
BDU:2022-00532

Уязвимость исполняемого файла cleanup.exe антивирусного программного средства McAfee Agent, позволяющая нарушителю выполнить произвольные команды

CVSS3: 7.7
0%
Низкий
около 4 лет назад

Уязвимостей на страницу