Page 5 of 85 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Stormshield Endpoint Security before 2.1.2 allows remote code execution. Stormshield Endpoint Security versiones anteriores a 2.1.2, permite una ejecución de código remota • https://advisories.stormshield.eu/2021-070 •

CVSS: 5.2EPSS: 0%CPEs: 1EXPL: 0

Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control. Stormshield Endpoint Security versiones 2.x anteriores a 2.1.2 , presenta un Control de Acceso Incorrecto • https://advisories.stormshield.eu/2021-071 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control. Stormshield Endpoint Security desde la versión 2.1.0 a 2.1.1, presenta un Control de Acceso Incorrecto • https://advisories.stormshield.eu/2021-072 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot. ESET se dio cuenta de una vulnerabilidad en sus productos de consumo y empresariales para macOS que permite a un usuario conectado al sistema detener el demonio de ESET, deshabilitando efectivamente la protección del producto de seguridad de ESET hasta un reinicio del sistema • https://support.eset.com/en/ca8151 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Possible system denial of service in case of arbitrary changing Firefox browser parameters. An attacker could change specific Firefox browser parameters file in a certain way and then reboot the system to make the system unbootable. Una posible denegación de servicio del sistema en caso de cambio arbitrario de los parámetros del navegador Firefox. Un atacante podría cambiar un archivo específico de parámetros del navegador Firefox de una manera determinada y luego reiniciar el sistema para hacer que el sistema no pueda arrancar This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Kaspersky Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within Kaspersky Lab Launcher. • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021 https://www.zerodayinitiative.com/advisories/ZDI-21-1280 https://www.zerodayinitiative.com/advisories/ZDI-22-431 •