Filtered by vendor Cyberark
Subscriptions
Filtered by product Endpoint Privilege Manager
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2018-14894 | 1 Cyberark | 1 Endpoint Privilege Manager | 2024-08-05 | N/A |
CyberArk Endpoint Privilege Manager 10.2.1.603 and earlier allows an attacker (who is able to edit permissions of a file) to bypass intended access restrictions and execute blocked applications. | ||||
CVE-2018-13052 | 1 Cyberark | 1 Endpoint Privilege Manager | 2024-08-05 | N/A |
In CyberArk Endpoint Privilege Manager (formerly Viewfinity), Privilege Escalation is possible if the attacker has one process that executes as Admin. | ||||
CVE-2018-12903 | 1 Cyberark | 1 Endpoint Privilege Manager | 2024-08-05 | N/A |
In CyberArk Endpoint Privilege Manager (formerly Viewfinity) 10.2.1.603, there is persistent XSS via an account name on the create token screen, the VfManager.asmx SelectAccounts->DisplayName screen, a user's groups in ConfigurationPage, the Dialog Title field, and App Group Name in the Application Group Wizard. | ||||
CVE-2019-9627 | 1 Cyberark | 1 Endpoint Privilege Manager | 2024-08-04 | 7.0 High |
A buffer overflow in the kernel driver CybKernelTracker.sys in CyberArk Endpoint Privilege Manager versions prior to 10.7 allows an attacker (without Administrator privileges) to escalate privileges or crash the machine by loading an image, such as a DLL, with a long path. | ||||
CVE-2020-25738 | 1 Cyberark | 1 Endpoint Privilege Manager | 2024-08-04 | 5.5 Medium |
CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database. | ||||
CVE-2021-44049 | 1 Cyberark | 1 Endpoint Privilege Manager | 2024-08-04 | 7.8 High |
CyberArk Endpoint Privilege Manager (EPM) through 11.5.3.328 before 2021-12-20 allows a local user to gain elevated privileges via a Trojan horse Procmon64.exe in the user's Temp directory. |
Page 1 of 1.