Download
| Alert*
oval:org.secpod.oval:def:1555
Symantec Endpoint Protection is installed oval:org.secpod.oval:def:55475 The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 through 12.1 RU6 MP10 or 14.x before 14.2 RU1 and is prone to a DLL Preloading vulnerability. A flaw is present in the application, which fails to handle when an application looks to call a DLL for execution. Successful exploi ... oval:org.secpod.oval:def:9765 The host is installed with Symantec AntiVirus (SAV) before 10.1 MR8, Symantec Endpoint Protection (SEP) 11.0 before 11.0 MR1, Norton 360 1.0, or Norton Internet Security 2005 through 2008, and is prone to multiple cross site scripting vulnerabilities. The flaws are present in the applications, which ... oval:org.secpod.oval:def:47278 The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to sanitize logged-in user input. Successful exploitation could allow attackers to run arbitrary code on the loc ... oval:org.secpod.oval:def:47279 The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 or 14.x before 14.0 MP1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to interpret a ... oval:org.secpod.oval:def:9759 The host is installed with Symantec AntiVirus Corporate Edition 9 before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to an arbitrary code execution vulnerability. A flaw ... oval:org.secpod.oval:def:9760 The host is installed with Symantec AntiVirus Corporate Edition 9.0 MR6 and earlier before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to multiple stack-based buffer ove ... oval:org.secpod.oval:def:5928 The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle flood of packets. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:47281 The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to perform multiple file and di ... oval:org.secpod.oval:def:47280 The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 or 14.x before 14.0 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to inte ... oval:org.secpod.oval:def:55477 The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation c ... oval:org.secpod.oval:def:55476 The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation c ... oval:org.secpod.oval:def:5930 The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Successful exploitation could allow attackers to delete files. oval:org.secpod.oval:def:9761 The host is installed with Symantec AntiVirus Corporate Edition 9.0 before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to an arbitrary code execution vulnerability. A fl ... oval:org.secpod.oval:def:55478 The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 MP1 and is prone to a DLL Preloading vulnerability. A flaw is present in the application, which fails to handle a DLL provided by the attacker when an application is installed unintentionally. Successful exploitation coul ... oval:org.secpod.oval:def:5929 The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 and is prone to a remote file inclusion vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Successful exploitation could allow attackers to conduct file-insertion attacks ... oval:org.secpod.oval:def:5931 The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted script. Successful exploitation could allow local users to gain privileges. oval:org.secpod.oval:def:9758 The host is installed with Symantec Antivirus Corporate Edition 10.1 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security (SCS) 3.0 before 3.1 MR8 or Symantec Endpoint Protection (SEP) 11.0 before 11.0 MR2 and is prone to an arbitrary code execution vulnerability. A flaw is present in th ... oval:org.secpod.oval:def:9771 The host is installed with Symantec Endpoint Protection 11.0 before 11.0 RU7-MP3 or 12.0 before SEP 12.1 RU2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted inputs to PHP scripts. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:47282 The host is installed with Symantec Endpoint Protection (SEP) Client through 12.1 RU6 MP9 and is prone to a tamper protection bypass. A flaw is present in the application, which fails to handle text alteration in a UI element. Successful exploitation could allow attackers to bypass tamper-protection ... oval:org.secpod.oval:def:83351 The host is installed with Symantec Endpoint Protection (SEP) before 14.3 RU1 MP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle exceptions. Successful exploitation could allow attackers to cause denial of service. oval:org.secpod.oval:def:65565 The host is installed with Symantec Endpoint Protection (SEP) 12.x before 12.1 RU6 MP10 or 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to comp ... oval:org.secpod.oval:def:65566 The host is installed with Symantec Endpoint Protection Manager (SEPM) 14.x before 14.2 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software ... oval:org.secpod.oval:def:65567 The host is installed with Symantec Endpoint Protection Manager (SEPM) 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software ... oval:org.secpod.oval:def:63064 The host is installed with Symantec Endpoint Protection Manager Client before 14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to gain elevated privileges o ... oval:org.secpod.oval:def:65568 The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to a password protection bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to bypass the secondary layer ... oval:org.secpod.oval:def:63063 The host is installed with Symantec Endpoint Protection Manager Client before 14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to potentially reset the ACLs ... oval:org.secpod.oval:def:65569 The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to an unsigned code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute code without a reside ... oval:org.secpod.oval:def:63062 The host is installed with Symantec Endpoint Protection Manager (SEPM) before 14.3 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to gain elevated privileges on the ... oval:org.secpod.oval:def:63061 The host is installed with Symantec Endpoint Protection Manager (SEPM) before 14.3 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to determine the size of files ... oval:org.secpod.oval:def:63060 The host is installed with Symantec Endpoint Protection Manager (SEPM) before 14.3 and is prone to an out of bounds vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker in reading memory outside of the bo ... oval:org.secpod.oval:def:65570 The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software applicati ... oval:org.secpod.oval:def:48220 The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6 MP10 or 14.x before 14 RU1 MP1 and is prone to a local denial of service vulnerability. A flaw is present in the application, which fails to handle issues in code paths. Successful exploitation could allows local user ... oval:org.secpod.oval:def:48221 The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6 MP10 or 14.x before 14 RU1 MP1 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the resources. Successful exploitation could allows a user to gain ... |