Show filters
242 Total Results
Displaying 171-180 of 242
Sort by:
Attacker Value
Unknown
CVE-2019-8458
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
0
Attacker Value
Unknown
CVE-2019-8459
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
Check Point Endpoint Security Client for Windows, with the VPN blade, before version E80.83, starts a process without using quotes in the path. This can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one.
0
Attacker Value
Unknown
McAfee Endpoint Security firewall not always acting on GTI lookup results
Disclosure Date: May 15, 2019 (last updated November 08, 2023)
Protection Mechanism Failure in the Firewall in McAfee Endpoint Security (ENS) 10.x prior to 10.6.1 May 2019 update allows context-dependent attackers to circumvent ENS protection where GTI flagged IP addresses are not blocked by the ENS Firewall via specially crafted malicious sites where the GTI reputation is carefully manipulated and does not correctly trigger the ENS Firewall to block the connection.
0
Attacker Value
Unknown
Untrusted Search Path vulnerability in EPSecurityService.exe (VA-3500)
Disclosure Date: May 03, 2019 (last updated February 21, 2025)
An Untrusted Search Path vulnerability in EPSecurityService.exe as used in Bitdefender Endpoint Security Tools versions prior to 6.6.11.163 allows an attacker to load an arbitrary DLL file from the search path. This issue affects: Bitdefender EPSecurityService.exe versions prior to 6.6.11.163.
0
Attacker Value
Unknown
CVE-2019-8454
Disclosure Date: April 29, 2019 (last updated November 08, 2023)
A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.
0
Attacker Value
Unknown
CVE-2018-18366
Disclosure Date: April 25, 2019 (last updated November 27, 2024)
Symantec Norton Security prior to 22.16.3, SEP (Windows client) prior to and including 12.1 RU6 MP9, and prior to 14.2 RU1, SEP SBE prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22, SEP-12.1.7484.7002 and SEP Cloud prior to 22.16.3 may be susceptible to a kernel memory disclosure, which is a type of issue where a specially crafted IRP request can cause the driver to return uninitialized memory.
0
Attacker Value
Unknown
CVE-2018-18369
Disclosure Date: April 25, 2019 (last updated November 27, 2024)
Norton Security (Windows client) prior to 22.16.3 and SEP SBE (Windows client) prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22 & SEP-12.1.7484.7002, may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for execution and an attacker provides a malicious DLL to use instead.
0
Attacker Value
Unknown
CVE-2019-8452
Disclosure Date: April 22, 2019 (last updated November 27, 2024)
A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.
0
Attacker Value
Unknown
McAfee Endpoint Security updates fix a privilege escalation vulnerability
Disclosure Date: February 28, 2019 (last updated November 08, 2023)
Privilege Escalation vulnerability in Microsoft Windows client in McAfee Endpoint Security (ENS) 10.6.1 and earlier allows local users to gain elevated privileges via a specific set of circumstances.
0
Attacker Value
Unknown
Dell Encryption and Dell Endpoint Security Suite Enterprise Security Policy Ove…
Disclosure Date: October 11, 2018 (last updated November 27, 2024)
On install, Dell Encryption versions prior 10.0.1 and Dell Endpoint Security Suite Enterprise versions prior 2.0.1 will overwrite and manually set the "Minimum Password Length" group policy object to a value of 1 on that device. This allows for users to bypass any existing policy for password length and potentially create insecure password on their device. This value is defined during the installation of the "Encryption Management Agent" or "EMAgent" application. There are no other known values modified.
0