Show filters
242 Total Results
Displaying 121-130 of 242
Sort by:
Attacker Value
Unknown
CVE-2021-23880
Disclosure Date: February 10, 2021 (last updated February 22, 2025)
Improper Access Control in attribute in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows authenticated local administrator user to perform an uninstallation of the anti-malware engine via the running of a specific command with the correct parameters.
0
Attacker Value
Unknown
CVE-2021-23881
Disclosure Date: February 10, 2021 (last updated February 22, 2025)
A stored cross site scripting vulnerability in ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 February 2021 Update allows an ENS ePO administrator to add a script to a policy event which will trigger the script to be run through a browser block page when a local non-administrator user triggers the policy.
0
Attacker Value
Unknown
CVE-2020-26941
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.
0
Attacker Value
Unknown
CVE-2020-6021
Disclosure Date: December 03, 2020 (last updated February 22, 2025)
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client’s privileges.
0
Attacker Value
Unknown
CVE-2020-7331
Disclosure Date: November 11, 2020 (last updated February 22, 2025)
Unquoted service executable path in McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files.
0
Attacker Value
Unknown
CVE-2020-7332
Disclosure Date: November 11, 2020 (last updated February 22, 2025)
Cross Site Request Forgery vulnerability in the firewall ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows an attacker to execute arbitrary HTML code due to incorrect security configuration.
0
Attacker Value
Unknown
CVE-2020-7333
Disclosure Date: November 11, 2020 (last updated February 22, 2025)
Cross site scripting vulnerability in the firewall ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows administrators to inject arbitrary web script or HTML via the configuration wizard.
0
Attacker Value
Unknown
CVE-2020-6015
Disclosure Date: November 05, 2020 (last updated February 22, 2025)
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations.
0
Attacker Value
Unknown
CVE-2020-6014
Disclosure Date: November 02, 2020 (last updated February 22, 2025)
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
0
Attacker Value
Unknown
CVE-2020-7320
Disclosure Date: September 08, 2020 (last updated February 22, 2025)
Protection Mechanism Failure vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2020 Update allows local administrator to temporarily reduce the detection capability allowing otherwise detected malware to run via stopping certain Microsoft services.
0