Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
endpoint security vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv2
CVE-2020-6014
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution wit...
Checkpoint Endpoint Security
4.4
CVSSv2
CVE-2020-6021
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a ...
Checkpoint Endpoint Security
2.9
CVSSv2
CVE-2021-31221
SES Evolution prior to 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed.
Stormshield Endpoint Security
2.9
CVSSv2
CVE-2021-31224
SES Evolution prior to 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies.
Stormshield Endpoint Security
1.9
CVSSv2
CVE-2021-23882
Improper Access Control vulnerability in McAfee Endpoint Security (ENS) for Windows before 10.7.0 February 2021 Update allows local administrators to prevent the installation of some ENS files by placing carefully crafted files where ENS will be installed. This is only applicable...
Mcafee Endpoint Security
4.6
CVSSv2
CVE-2021-35957
Stormshield Endpoint Security Evolution 2.0.0 up to and including 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\system32) with malicious ones.
Stormshield Endpoint Security
3.6
CVSSv2
CVE-2020-7265
Privilege Escalation vulnerability in McAfee Endpoint Security (ENS) for Mac before 10.6.9 allows local users to delete files the user would otherwise not have access to via manipulating symbolic links to redirect a McAfee delete action to an unintended file. This is achieved thr...
Mcafee Endpoint Security
2.1
CVSSv2
CVE-2020-7320
Protection Mechanism Failure vulnerability in McAfee Endpoint Security (ENS) for Windows before 10.7.0 September 2020 Update allows local administrator to temporarily reduce the detection capability allowing otherwise detected malware to run via stopping certain Microsoft service...
Mcafee Endpoint Security
5.9
CVSSv2
CVE-2020-7323
Authentication Protection Bypass vulnerability in McAfee Endpoint Security (ENS) for Windows before 10.7.0 September 2020 Update allows physical local users to bypass the Windows lock screen via triggering certain detection events while the computer screen is locked and the McTra...
Mcafee Endpoint Security
4.6
CVSSv2
CVE-2020-7331
Unquoted service executable path in McAfee Endpoint Security (ENS) before 10.7.0 November 2020 Update allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files.
Mcafee Endpoint Security
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5274
CVE-2024-35388
CVE-2024-35396
elevation of privilege
CVE-2021-47544
file upload
CVE-2021-47545
memory leak
CVE-2024-4956
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »