📦 Defender For Endpoint
by Microsoft
🔍 What is Defender For Endpoint?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A code injection vulnerability in Microsoft Defender for Linux allows attackers on adjacent networks to execute arbitrary code without authorization. This affects organizations using Microsoft Defende...
A time-of-check time-of-use race condition vulnerability in Microsoft Defender for Linux allows a local authenticated attacker to cause a denial of service. This affects Linux systems running Microsof...
CVE-2025-47161 is an improper access control vulnerability in Microsoft Defender for Endpoint that allows authenticated attackers to elevate privileges locally. This affects organizations using Micros...
This vulnerability allows attackers to spoof Microsoft Defender for Endpoint on Android, potentially tricking users into believing malicious apps are legitimate. It affects Android devices running Mic...
This vulnerability in Microsoft Defender for Endpoint allows attackers to elevate privileges on affected systems. It enables local authenticated attackers to gain SYSTEM-level access by exploiting imp...
This vulnerability in Microsoft Defender for Endpoint allows an authorized attacker to manipulate file paths to achieve local privilege escalation. It affects organizations using Microsoft Defender fo...
This vulnerability allows an authorized attacker to improperly access sensitive information from Windows Defender's Global Files search index over a network. It affects Windows systems with Defender e...
This vulnerability allows an authorized attacker to perform local spoofing attacks via relative path traversal in Microsoft Defender for Endpoint. Attackers can manipulate file paths to bypass securit...