Product:

Forefront_endpoint_protection_2010

(Microsoft)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 8
Date Id Summary Products Score Patch Annotated
2020-04-15 CVE-2020-1002 An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'. Forefront_endpoint_protection_2010, Security_essentials, System_center_endpoint_protection, Windows_defender 7.1
2020-06-09 CVE-2020-1163 An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1170. Forefront_endpoint_protection_2010, Security_essentials, System_center_endpoint_protection, Windows_defender 7.8
2020-06-09 CVE-2020-1170 An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1163. Forefront_endpoint_protection_2010, Security_essentials, System_center_endpoint_protection, Windows_defender 7.8
2020-07-14 CVE-2020-1461 An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'. Forefront_endpoint_protection_2010, Security_essentials, System_center_endpoint_protection, Windows_defender 7.1
2019-08-14 CVE-2019-1161 An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted command that could exploit the vulnerability and delete protected files on an affected system once MpSigStub.exe ran again. The update addresses the vulnerability and blocks the arbitrary deletion. Forefront_endpoint_protection_2010, Security_essentials, System_center_endpoint_protection, Windows_defender 7.1