CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
7 results Clear all
CVE-2016-8010 7.8 HIGH EPSS 0.00
Intel Security McAfee MAC <7.0-ENS <10.2 - Auth Bypass
Application protections bypass vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and earlier and Endpoint Security (ENS) 10.2 and earlier allows local users to bypass local security protection via a command-line utility.
CWE-284 Mar 14, 2017
CVE-2016-8009 7.8 HIGH EPSS 0.00
Intel Security McAfee MAC <7.0-6.x - Privilege Escalation
Privilege escalation vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and 6.x versions allows attackers to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.
CWE-264 Mar 14, 2017
CVE-2014-9920 5.9 MEDIUM EPSS 0.00
Mcafee Application Control - Improper Access Control
Unauthorized execution of binary vulnerability in McAfee (now Intel Security) McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier allows attackers to create a malformed Windows binary that is considered non-executable and is not protected through the whitelisting protection feature via a specific set of circumstances.
CWE-284 Mar 14, 2017
CVE-2013-7461 5.5 MEDIUM EPSS 0.00
McAfee MCC <6.1.0 - Privilege Escalation
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Change Control (MCC) 6.1.0 for Linux and earlier allows authenticated users to change files that are part of write protection rules via specific conditions.
CWE-284 Mar 14, 2017
CVE-2013-7460 5.5 MEDIUM EPSS 0.00
McAfee MAC <6.1.0 - Privilege Escalation
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Application Control (MAC) 6.1.0 for Linux and earlier allows authenticated users to change binaries that are part of the Application Control whitelist and allows execution of binaries via specific conditions.
CWE-284 Mar 14, 2017
CVE-2016-1715 6.6 MEDIUM EPSS 0.00
McAfee Application Control <6.2.0 - Memory Corruption
The swin.sys kernel driver in McAfee Application Control (MAC) 6.1.0 before build 706, 6.1.1 before build 404, 6.1.2 before build 449, 6.1.3 before build 441, and 6.2.0 before build 505 on 32-bit Windows platforms allows local users to cause a denial of service (memory corruption and system crash) or gain privileges via a 768 syscall, which triggers a zero to be written to an arbitrary kernel memory location.
CWE-189 Jan 12, 2016
CVE-2012-4593 EPSS 0.00
McAfee Application Control and Change Control <6.0.0 - Auth Bypass
McAfee Application Control and Change Control 5.1.x and 6.0.0 do not enforce an intended password requirement in certain situations involving attributes of the password file, which allows local users to bypass authentication by executing a command.
CWE-264 Aug 22, 2012