Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
endpoint protection vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2021-1647
Microsoft Defender Remote Code Execution Vulnerability
Microsoft Windows Defender -
Microsoft Security Essentials -
Microsoft System Center Endpoint Protection -
Microsoft System Center Endpoint Protection 2012
2 Articles
3.5
CVSSv2
CVE-2020-35677
BigProf Online Invoicing System prior to 4.0 fails to adequately sanitize fields for HTML characters upon an administrator using admin/pageEditGroup.php to create a new group, resulting in Stored XSS. The caveat here is that an attacker would need administrative privileges in ord...
Bigprof Online Invoicing System
6.6
CVSSv2
CVE-2020-28641
In Malwarebytes Free 4.1.0.56, a symbolic link may be used delete an arbitrary file on the system by exploiting the local quarantine system.
Malwarebytes Endpoint Protection
Malwarebytes Malwarebytes 4.1.0.56
1.9
CVSSv2
CVE-2020-25738
CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows malicious users to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database.
Cyberark Endpoint Privilege Manager 11.1.0.173
2.1
CVSSv2
CVE-2020-7320
Protection Mechanism Failure vulnerability in McAfee Endpoint Security (ENS) for Windows before 10.7.0 September 2020 Update allows local administrator to temporarily reduce the detection capability allowing otherwise detected malware to run via stopping certain Microsoft service...
Mcafee Endpoint Security
5.9
CVSSv2
CVE-2020-7323
Authentication Protection Bypass vulnerability in McAfee Endpoint Security (ENS) for Windows before 10.7.0 September 2020 Update allows physical local users to bypass the Windows lock screen via triggering certain detection events while the computer screen is locked and the McTra...
Mcafee Endpoint Security
5
CVSSv2
CVE-2020-8210
Insufficient protection of secrets in Citrix XenMobile Server 10.12 before RP3, Citrix XenMobile Server 10.11 before RP6, Citrix XenMobile Server 10.10 RP6 and Citrix XenMobile Server prior to 10.9 RP5 discloses credentials of a service account.
Citrix Xenmobile Server
Citrix Xenmobile Server 10.9.0
Citrix Xenmobile Server 10.10.0
Citrix Xenmobile Server 10.11.0
Citrix Xenmobile Server 10.12.0
5
CVSSv2
CVE-2020-6165
SilverStripe 4.5.0 allows malicious users to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against ...
Silverstripe Silverstripe
3.6
CVSSv2
CVE-2020-1461
An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability...
Microsoft Windows Defender -
Microsoft Forefront Endpoint Protection 2010 -
Microsoft Security Essentials -
Microsoft System Center Endpoint Protection -
Microsoft System Center Endpoint Protection 2012
3.3
CVSSv2
CVE-2020-3350
A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local malicious user to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scan...
Cisco Advanced Malware Protection For Endpoints
Cisco Clam Antivirus
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »