Show filters
242 Total Results
Displaying 161-170 of 242
Sort by:
Attacker Value
Unknown
CVE-2019-8463
Disclosure Date: December 23, 2019 (last updated November 27, 2024)
A denial of service vulnerability was reported in Check Point Endpoint Security Client for Windows before E82.10, that could allow service log file to be written to non-standard locations.
0
Attacker Value
Unknown
CVE-2019-12759
Disclosure Date: November 15, 2019 (last updated November 27, 2024)
Symantec Endpoint Protection Manager (SEPM) and Symantec Mail Security for MS Exchange (SMSMSE), prior to versions 14.2 RU2 and 7.5.x respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
0
Attacker Value
Unknown
CVE-2019-16519
Disclosure Date: October 14, 2019 (last updated November 27, 2024)
ESET Cyber Security 6.7.900.0 for macOS allows a local attacker to execute unauthorized commands as root by abusing an undocumented feature in scheduled tasks.
0
Attacker Value
Unknown
CVE-2019-3653
Disclosure Date: October 09, 2019 (last updated November 08, 2023)
Improper access control vulnerability in Configuration tool in McAfee Endpoint Security (ENS) Prior to 10.6.1 October 2019 Update allows local user to gain access to security configuration via unauthorized use of the configuration tool.
0
Attacker Value
Unknown
CVE-2019-3652
Disclosure Date: October 09, 2019 (last updated November 08, 2023)
Code Injection vulnerability in EPSetup.exe in McAfee Endpoint Security (ENS) Prior to 10.6.1 October 2019 Update allows local user to get their malicious code installed by the ENS installer via code injection into EPSetup.exe by an attacker with access to the installer.
0
Attacker Value
Unknown
CVE-2019-3745
Disclosure Date: October 03, 2019 (last updated November 27, 2024)
The vulnerability is limited to the installers of Dell Encryption Enterprise versions prior to 10.4.0 and Dell Endpoint Security Suite Enterprise versions prior to 2.4.0. This issue is exploitable only during the installation of the product by an administrator. A local authenticated low privileged user potentially could exploit this vulnerability by staging a malicious DLL in the search path of the installer prior to its execution by a local administrator. This would cause loading of the malicious DLL, which would allow the attacker to execute arbitrary code in the context of an administrator.
0
Attacker Value
Unknown
CVE-2019-1255
Disclosure Date: September 23, 2019 (last updated November 27, 2024)
A denial of service vulnerability exists when Microsoft Defender improperly handles files, aka 'Microsoft Defender Denial of Service Vulnerability'.
0
Attacker Value
Unknown
CVE-2019-8461
Disclosure Date: August 29, 2019 (last updated November 27, 2024)
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user.
0
Attacker Value
Unknown
CVE-2019-1161
Disclosure Date: August 14, 2019 (last updated May 30, 2024)
An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.
To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted command that could exploit the vulnerability and delete protected files on an affected system once MpSigStub.exe ran again.
The update addresses the vulnerability and blocks the arbitrary deletion.
0
Attacker Value
Unknown
CVE-2019-14242
Disclosure Date: July 30, 2019 (last updated November 27, 2024)
An issue was discovered in Bitdefender products for Windows (Bitdefender Endpoint Security Tool versions prior to 6.6.8.115; and Bitdefender Antivirus Plus, Bitdefender Internet Security, and Bitdefender Total Security versions prior to 23.0.24.120) that can lead to local code injection. A local attacker with administrator privileges can create a malicious DLL file in %SystemRoot%\System32\ that will be executed with local user privileges.
0