Show filters
242 Total Results
Displaying 11-20 of 242
Sort by:
Attacker Value
Unknown

CVE-2024-24912

Disclosure Date: May 01, 2024 (last updated May 02, 2024)
A local privilege escalation vulnerability has been identified in Harmony Endpoint Security Client for Windows versions E88.10 and below. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system.
0
Attacker Value
Unknown

CVE-2024-2224

Disclosure Date: April 09, 2024 (last updated February 08, 2025)
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects the following products that include the vulnerable component: Bitdefender Endpoint Security for Linux version 7.0.5.200089 Bitdefender Endpoint Security for Windows version 7.9.9.380 GravityZone Control Center (On Premises) version 6.36.1
Attacker Value
Unknown

CVE-2024-2223

Disclosure Date: April 09, 2024 (last updated February 08, 2025)
An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component:  Bitdefender Endpoint Security for Linux version 7.0.5.200089 Bitdefender Endpoint Security for  Windows version 7.9.9.380 GravityZone Control Center (On Premises) version 6.36.1
Attacker Value
Unknown

CVE-2024-0353

Disclosure Date: February 15, 2024 (last updated January 24, 2025)
Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
Attacker Value
Unknown

CVE-2024-23764

Disclosure Date: February 08, 2024 (last updated February 16, 2024)
Certain WithSecure products allow Local Privilege Escalation. This affects WithSecure Client Security 15 and later, WithSecure Server Security 15 and later, WithSecure Email and Server Security 15 and later, and WithSecure Elements Endpoint Protection 17 and later.
Attacker Value
Unknown

CVE-2023-32479

Disclosure Date: February 06, 2024 (last updated February 14, 2024)
Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 contain privilege escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by replacing binaries in installed directory and taking reverse shell of the system leading to Privilege Escalation.
Attacker Value
Unknown

CVE-2023-7043

Disclosure Date: January 31, 2024 (last updated February 09, 2024)
Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions.
Attacker Value
Unknown

CVE-2024-0316

Disclosure Date: January 15, 2024 (last updated January 20, 2024)
Improper cleanup vulnerability in exceptions thrown in FireEye Endpoint Security, affecting version 5.2.0.958244. This vulnerability could allow an attacker to send multiple request packets to the containment_notify/preview parameter, which could lead to a service outage.
Attacker Value
Unknown

CVE-2024-0310

Disclosure Date: January 10, 2024 (last updated January 18, 2024)
A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration.
Attacker Value
Unknown

CVE-2023-5594

Disclosure Date: December 21, 2023 (last updated January 05, 2024)
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.