
CVE-2023-7043 – Unquoted path privilege vulnerability in ESET products for Windows
https://notcve.org/view.php?id=CVE-2023-7043
31 Jan 2024 — Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions. La ruta de servicio sin comillas en los productos ESET permite colocar un programa preparado en una ubicación específica y ejecutarlo al arrancar con los permisos NT AUTHORITY\NetworkService. Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissio... • https://support.eset.com/en/ca8602 • CWE-428: Unquoted Search Path or Element •

CVE-2024-0316 – Improper cleanup vulnerability in FireEye Endpoint Security
https://notcve.org/view.php?id=CVE-2024-0316
15 Jan 2024 — Improper cleanup vulnerability in exceptions thrown in FireEye Endpoint Security, affecting version 5.2.0.958244. This vulnerability could allow an attacker to send multiple request packets to the containment_notify/preview parameter, which could lead to a service outage. Vulnerabilidad de limpieza incorrecta en excepciones lanzadas en FireEye Endpoint Security, que afecta la versión 5.2.0.958244. Esta vulnerabilidad podría permitir a un atacante enviar múltiples paquetes de solicitud al parámetro containme... • https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fireeye-products • CWE-460: Improper Cleanup on Thrown Exception •

CVE-2023-3665
https://notcve.org/view.php?id=CVE-2023-3665
04 Oct 2023 — A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables, leading to denial of service and or the execution of arbitrary code. Una vulnerabilidad de inyección de código en Trellix ENS 10.7.0 de abril de 2023 y versiones anteriores permitió a un usuario local deshabilitar el componente ENS AMSI a través de variables de entorno, lo que provocó la denegación de servicio o la ejecución de código arbitrar... • https://kcm.trellix.com/corporate/index?page=content&id=SB10405 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-35799
https://notcve.org/view.php?id=CVE-2023-35799
27 Jun 2023 — Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges. • https://advisories.stormshield.eu • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-35800
https://notcve.org/view.php?id=CVE-2023-35800
27 Jun 2023 — Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators. • https://advisories.stormshield.eu • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-23562
https://notcve.org/view.php?id=CVE-2023-23562
31 May 2023 — Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control that allows an authenticated user can update global parameters. • https://advisories.stormshield.eu •

CVE-2023-23561
https://notcve.org/view.php?id=CVE-2023-23561
30 May 2023 — Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users can read sensitive information. • https://advisories.stormshield.eu • CWE-346: Origin Validation Error •

CVE-2022-38777
https://notcve.org/view.php?id=CVE-2022-38777
08 Feb 2023 — An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account. • https://discuss.elastic.co/t/elastic-7-17-9-8-5-0-and-8-6-1-security-update/324661 • CWE-269: Improper Privilege Management •

CVE-2022-4304 – Timing Oracle in RSA Decryption
https://notcve.org/view.php?id=CVE-2022-4304
07 Feb 2023 — A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the serve... • https://github.com/Trinadh465/Openssl-1.1.1g_CVE-2022-4304 • CWE-203: Observable Discrepancy •

CVE-2022-38774
https://notcve.org/view.php?id=CVE-2022-38774
24 Jan 2023 — An issue was discovered in the quarantine feature of Elastic Endpoint Security and Elastic Endgame for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account. Se descubrió un problema en la función de cuarentena de Elastic Endpoint Security y Elastic Endgame para Windows, que podría permitir a los usuarios sin privilegios elevar sus permisos a los de la cuenta LocalSystem. • https://discuss.elastic.co/t/endpoint-security-8-4-0-7-17-7-and-endgame-3-62-3-security-statement/323754 • CWE-269: Improper Privilege Management •