Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ens vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2020-7277
Protection mechanism failure in all processes in McAfee Endpoint Security (ENS) for Windows before 10.7.0 April 2020 Update allows local users to stop certain McAfee ENS processes, reducing the protection offered.
Mcafee Endpoint Security 10.5.0
Mcafee Endpoint Security 10.5.1
Mcafee Endpoint Security 10.5.2
Mcafee Endpoint Security 10.5.3
Mcafee Endpoint Security 10.5.4
Mcafee Endpoint Security 10.5.5
Mcafee Endpoint Security 10.6.0
6.5
CVSSv3
CVE-2020-7278
Exploiting incorrectly configured access control security levels vulnerability in ENS Firewall in McAfee Endpoint Security (ENS) for Windows before 10.7.0 April 2020 and 10.6.1 April 2020 updates allows remote attackers and local users to allow or block unauthorized traffic via p...
Mcafee Endpoint Security 10.5.0
Mcafee Endpoint Security 10.5.1
Mcafee Endpoint Security 10.5.2
Mcafee Endpoint Security 10.5.3
Mcafee Endpoint Security 10.5.4
Mcafee Endpoint Security 10.5.5
Mcafee Endpoint Security 10.6.0
6.7
CVSSv3
CVE-2020-7263
Improper access control vulnerability in ESconfigTool.exe in McAfee Endpoint Security (ENS) for Windows all current versions allows local administrator to alter ENS configuration up to and including disabling all protection offered by ENS via insecurely implemented encryption of ...
Mcafee Endpoint Security 10.5.0
Mcafee Endpoint Security 10.5.1
Mcafee Endpoint Security 10.5.2
Mcafee Endpoint Security 10.5.3
Mcafee Endpoint Security 10.5.4
Mcafee Endpoint Security 10.5.5
Mcafee Endpoint Security 10.6.0
Mcafee Endpoint Security 10.6.1
Mcafee Endpoint Security 10.7.0
5.5
CVSSv3
CVE-2020-7251
Improper access control vulnerability in Configuration Tool in McAfee Mcafee Endpoint Security (ENS) before 10.6.1 February 2020 Update allows local users to disable security features via unauthorised use of the configuration tool from older versions of ENS.
Mcafee Endpoint Security
8.7
CVSSv3
CVE-2020-5232
A user who owns an ENS domain can set a trapdoor, allowing them to transfer ownership to another user, and later regain ownership without the new owners consent or awareness. A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry.
Ens.domains Ethereum Name Service
1 Github repository
5.3
CVSSv3
CVE-2019-3652
Code Injection vulnerability in EPSetup.exe in McAfee Endpoint Security (ENS) before 10.6.1 October 2019 Update allows local user to get their malicious code installed by the ENS installer via code injection into EPSetup.exe by an attacker with access to the installer.
Mcafee Endpoint Security
Mcafee Endpoint Security 10.6.1
5.5
CVSSv3
CVE-2019-3653
Improper access control vulnerability in Configuration tool in McAfee Endpoint Security (ENS) before 10.6.1 October 2019 Update allows local user to gain access to security configuration via unauthorized use of the configuration tool.
Mcafee Endpoint Security
Mcafee Endpoint Security 10.16.1
7.5
CVSSv3
CVE-2019-3586
Protection Mechanism Failure in the Firewall in McAfee Endpoint Security (ENS) 10.x before 10.6.1 May 2019 update allows context-dependent malicious users to circumvent ENS protection where GTI flagged IP addresses are not blocked by the ENS Firewall via specially crafted malicio...
Mcafee Endpoint Security
Mcafee Endpoint Security 10.6.1
7.2
CVSSv3
CVE-2018-19512
In Webgalamb up to and including 7.0, a system/ajax.php "wgmfile restore" directory traversal vulnerability could lead to arbitrary code execution by authenticated administrator users, because PHP files are restored under the document root directory.
Ens Webgalamb
6.1
CVSSv3
CVE-2018-19509
wg7.php in Webgalamb 7.0 makes opportunistic calls to htmlspecialchars() instead of using a templating engine with proper contextual encoding. Because it is possible to insert arbitrary strings into the database, any JavaScript could be executed by the administrator, leading to X...
Ens Webgalamb 7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »