[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Successful exploitation could allow attackers to delete files.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation could allow attackers to bypass the antivirus and alter the file being scanned so it is not detected.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation could allow attackers to bypass the antivirus and alter the file being scanned so it is not detected.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 through 12.1 RU6 MP10 or 14.x before 14.2 RU1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a specially crafted IRP request. Successful exploitation could allow attackers to disclose the kernel memory.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 or 14.x before 14.0 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to interpret and evaluate the file metadata as a formula.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to perform multiple file and directory writes to the local filesystem.

The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle flood of packets. Successful exploitation could allow attackers to crash the service.

The host is installed with Symantec AntiVirus Corporate Edition 9.0 MR6 and earlier before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the applications, which fail to validate data sent t ...

The host is installed with Symantec AntiVirus Corporate Edition 9 before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a design error in XFR.EXE. Successful exploita ...

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 or 14.x before 14.0 MP1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to interpret and evaluate the file metadata as a formula.


Pages:      Start    1284    1285    1286    1287    1288    1289    1290    1291    1292    1293    1294    1295    1296    1297    ..   1429

© SecPod Technologies