5.3
CVE-2020-7275
- EPSS 0.12%
- Published 15.04.2020 12:15:12
- Last modified 21.11.2024 05:36:58
- Source trellixpsirt@trellix.com
- Teams watchlist Login
- Open Login
Accessing, modifying or executing executable files vulnerability in the uninstaller in McAfee Endpoint Security (ENS) for Windows Prior to 10.7.0 April 2020 Update allows local users to execute arbitrary code via a carefully crafted input file.
Data is provided by the National Vulnerability Database (NVD)
Mcafee ≫ Endpoint Security Version10.5.0 SwPlatformwindows
Mcafee ≫ Endpoint Security Version10.5.1 SwPlatformwindows
Mcafee ≫ Endpoint Security Version10.5.2 SwPlatformwindows
Mcafee ≫ Endpoint Security Version10.5.3 SwPlatformwindows
Mcafee ≫ Endpoint Security Version10.5.4 SwPlatformwindows
Mcafee ≫ Endpoint Security Version10.5.5 SwPlatformwindows
Mcafee ≫ Endpoint Security Version10.6.0 SwPlatformwindows
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.12% | 0.319 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 1.8 | 3.4 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
trellixpsirt@trellix.com | 4.8 | 1.3 | 3.4 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
|
CWE-428 Unquoted Search Path or Element
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.