43 results (0.015 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

15 Jan 2024 — Improper cleanup vulnerability in exceptions thrown in FireEye Endpoint Security, affecting version 5.2.0.958244. This vulnerability could allow an attacker to send multiple request packets to the containment_notify/preview parameter, which could lead to a service outage. Vulnerabilidad de limpieza incorrecta en excepciones lanzadas en FireEye Endpoint Security, que afecta la versión 5.2.0.958244. Esta vulnerabilidad podría permitir a un atacante enviar múltiples paquetes de solicitud al parámetro containme... • https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fireeye-products • CWE-460: Improper Cleanup on Thrown Exception •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

04 Oct 2023 — A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables, leading to denial of service and or the execution of arbitrary code. Una vulnerabilidad de inyección de código en Trellix ENS 10.7.0 de abril de 2023 y versiones anteriores permitió a un usuario local deshabilitar el componente ENS AMSI a través de variables de entorno, lo que provocó la denegación de servicio o la ejecución de código arbitrar... • https://kcm.trellix.com/corporate/index?page=content&id=SB10405 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

08 Feb 2023 — An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account. • https://discuss.elastic.co/t/elastic-7-17-9-8-5-0-and-8-6-1-security-update/324661 • CWE-269: Improper Privilege Management •

CVSS: 5.9EPSS: 0%CPEs: 10EXPL: 1

07 Feb 2023 — A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the serve... • https://github.com/Trinadh465/Openssl-1.1.1g_CVE-2022-4304 • CWE-203: Observable Discrepancy •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

24 Jan 2023 — An issue was discovered in the quarantine feature of Elastic Endpoint Security and Elastic Endgame for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account. Se descubrió un problema en la función de cuarentena de Elastic Endpoint Security y Elastic Endgame para Windows, que podría permitir a los usuarios sin privilegios elevar sus permisos a los de la cuenta LocalSystem. • https://discuss.elastic.co/t/endpoint-security-8-4-0-7-17-7-and-endgame-3-62-3-security-statement/323754 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

24 Jan 2023 — An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account. Se descubrió un problema en la función de reversión de Elastic Endpoint Security para Windows, que podría permitir a los usuarios sin privilegios elevar sus privilegios a los de la cuenta LocalSystem. • https://discuss.elastic.co/t/endpoint-security-8-4-1-security-statement/323753 • CWE-269: Improper Privilege Management •

CVSS: 6.0EPSS: 0%CPEs: 2EXPL: 0

16 Dec 2022 — Improper preservation of permissions vulnerability in Trellix Endpoint Agent (xAgent) prior to V35.31.22 on Windows allows a local user with administrator privileges to bypass the product protection to uninstall the agent via incorrectly applied permissions in the removal protection functionality. La vulnerabilidad de preservación inadecuada de permisos en Trellix Endpoint Agent (xAgent) anterior a V35.31.22 en Windows permite a un usuario local con privilegios de administrador omitir la protección del prod... • https://docs.trellix.com/bundle/xagent_35-31-22_rn/page/UUID-73c848e7-6107-fe11-d83d-b17bd5b1449c.html • CWE-281: Improper Preservation of Permissions •

CVSS: 7.8EPSS: 4%CPEs: 2EXPL: 0

12 May 2022 — Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links. Check Point Endpoint Security Client para Windows versiones anteriores a E86.40, copian archivos para informes forenses desde un directorio con privilegios bajos. Un atacante puede reemplazar esos archivos con cont... • https://supportcontent.checkpoint.com/solutions?id=sk178665%2C • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-65: Windows Hard Link •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

01 Apr 2022 — Kaspersky Anti-Virus products for home and Kaspersky Endpoint Security with antivirus databases released before 12 March 2022 had a bug in a data parsing module that potentially allowed an attacker to execute arbitrary code. The fix was delivered automatically. Credits: Georgy Zaytsev (Positive Technologies). Kaspersky Anti-Virus products for home and Kaspersky Endpoint Security with antivirus databases lanzados antes del 12 de marzo de 2022, tenían un error en un módulo de análisis de datos que potencialme... • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_2 •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

01 Apr 2022 — A denial-of-service issue existed in one of modules that was incorporated in Kaspersky Anti-Virus products for home and Kaspersky Endpoint Security. A local user could cause Windows crash by running a specially crafted binary module. The fix was delivered automatically. Credits: (Straghkov Denis, Kurmangaleev Shamil, Fedotov Andrey, Kuts Daniil, Mishechkin Maxim, Akolzin Vitaliy) @ ISPRAS Se presentaba un problema de denegación de servicio en uno de los módulos incorporados en los productos Kaspersky Anti-V... • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_1 •