[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted script. Successful exploitation could allow local users to gain privileges.

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 and is prone to a remote file inclusion vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Successful exploitation could allow attackers to conduct file-insertion attacks and execute arbitrary code.

The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 MP1 and is prone to a DLL Preloading vulnerability. A flaw is present in the application, which fails to handle a DLL provided by the attacker when an application is installed unintentionally. Successful exploitation could allow attackers to execute arbitrary code in the context of the affected application.

The host is installed with Symantec AntiVirus Corporate Edition 9.0 before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted packet. Successful exploitation co ...

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Successful exploitation could allow attackers to delete files.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation could allow attackers to bypass the antivirus and alter the file being scanned so it is not detected.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation could allow attackers to bypass the antivirus and alter the file being scanned so it is not detected.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 through 12.1 RU6 MP10 or 14.x before 14.2 RU1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a specially crafted IRP request. Successful exploitation could allow attackers to disclose the kernel memory.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 or 14.x before 14.0 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to interpret and evaluate the file metadata as a formula.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to perform multiple file and directory writes to the local filesystem.


Pages:      Start    1378    1379    1380    1381    1382    1383    1384    1385    1386    1387    1388    1389    1390    1391    ..   1483

© SecPod Technologies