[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:1555
Symantec Endpoint Protection is installed

oval:org.secpod.oval:def:55475
The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 through 12.1 RU6 MP10 or 14.x before 14.2 RU1 and is prone to a DLL Preloading vulnerability. A flaw is present in the application, which fails to handle when an application looks to call a DLL for execution. Successful exploi ...

oval:org.secpod.oval:def:9765
The host is installed with Symantec AntiVirus (SAV) before 10.1 MR8, Symantec Endpoint Protection (SEP) 11.0 before 11.0 MR1, Norton 360 1.0, or Norton Internet Security 2005 through 2008, and is prone to multiple cross site scripting vulnerabilities. The flaws are present in the applications, which ...

oval:org.secpod.oval:def:47278
The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to sanitize logged-in user input. Successful exploitation could allow attackers to run arbitrary code on the loc ...

oval:org.secpod.oval:def:47279
The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 or 14.x before 14.0 MP1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to interpret a ...

oval:org.secpod.oval:def:9759
The host is installed with Symantec AntiVirus Corporate Edition 9 before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to an arbitrary code execution vulnerability. A flaw ...

oval:org.secpod.oval:def:9760
The host is installed with Symantec AntiVirus Corporate Edition 9.0 MR6 and earlier before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to multiple stack-based buffer ove ...

oval:org.secpod.oval:def:5928
The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle flood of packets. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:47281
The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to perform multiple file and di ...

oval:org.secpod.oval:def:47280
The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 or 14.x before 14.0 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to inte ...

oval:org.secpod.oval:def:55477
The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation c ...

oval:org.secpod.oval:def:55476
The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation c ...

oval:org.secpod.oval:def:5930
The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Successful exploitation could allow attackers to delete files.

oval:org.secpod.oval:def:9761
The host is installed with Symantec AntiVirus Corporate Edition 9.0 before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to an arbitrary code execution vulnerability. A fl ...

oval:org.secpod.oval:def:55478
The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 MP1 and is prone to a DLL Preloading vulnerability. A flaw is present in the application, which fails to handle a DLL provided by the attacker when an application is installed unintentionally. Successful exploitation coul ...

oval:org.secpod.oval:def:5929
The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 and is prone to a remote file inclusion vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Successful exploitation could allow attackers to conduct file-insertion attacks ...

oval:org.secpod.oval:def:5931
The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted script. Successful exploitation could allow local users to gain privileges.

oval:org.secpod.oval:def:9758
The host is installed with Symantec Antivirus Corporate Edition 10.1 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security (SCS) 3.0 before 3.1 MR8 or Symantec Endpoint Protection (SEP) 11.0 before 11.0 MR2 and is prone to an arbitrary code execution vulnerability. A flaw is present in th ...

oval:org.secpod.oval:def:9771
The host is installed with Symantec Endpoint Protection 11.0 before 11.0 RU7-MP3 or 12.0 before SEP 12.1 RU2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted inputs to PHP scripts. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:47282
The host is installed with Symantec Endpoint Protection (SEP) Client through 12.1 RU6 MP9 and is prone to a tamper protection bypass. A flaw is present in the application, which fails to handle text alteration in a UI element. Successful exploitation could allow attackers to bypass tamper-protection ...

oval:org.secpod.oval:def:83351
The host is installed with Symantec Endpoint Protection (SEP) before 14.3 RU1 MP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle exceptions. Successful exploitation could allow attackers to cause denial of service.

oval:org.secpod.oval:def:65565
The host is installed with Symantec Endpoint Protection (SEP) 12.x before 12.1 RU6 MP10 or 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to comp ...

oval:org.secpod.oval:def:65566
The host is installed with Symantec Endpoint Protection Manager (SEPM) 14.x before 14.2 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software ...

oval:org.secpod.oval:def:65567
The host is installed with Symantec Endpoint Protection Manager (SEPM) 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software ...

oval:org.secpod.oval:def:63064
The host is installed with Symantec Endpoint Protection Manager Client before 14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to gain elevated privileges o ...

oval:org.secpod.oval:def:65568
The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to a password protection bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to bypass the secondary layer ...

oval:org.secpod.oval:def:63063
The host is installed with Symantec Endpoint Protection Manager Client before 14.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to potentially reset the ACLs ...

oval:org.secpod.oval:def:65569
The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to an unsigned code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute code without a reside ...

oval:org.secpod.oval:def:63062
The host is installed with Symantec Endpoint Protection Manager (SEPM) before 14.3 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to gain elevated privileges on the ...

oval:org.secpod.oval:def:63061
The host is installed with Symantec Endpoint Protection Manager (SEPM) before 14.3 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to determine the size of files ...

oval:org.secpod.oval:def:63060
The host is installed with Symantec Endpoint Protection Manager (SEPM) before 14.3 and is prone to an out of bounds vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker in reading memory outside of the bo ...

oval:org.secpod.oval:def:65570
The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software applicati ...

oval:org.secpod.oval:def:48220
The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6 MP10 or 14.x before 14 RU1 MP1 and is prone to a local denial of service vulnerability. A flaw is present in the application, which fails to handle issues in code paths. Successful exploitation could allows local user ...

oval:org.secpod.oval:def:48221
The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6 MP10 or 14.x before 14 RU1 MP1 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the resources. Successful exploitation could allows a user to gain ...

CVE    6
CVE-2016-5311
CVE-2017-6331
CVE-2020-5836
CVE-2020-5837
...
*CPE
cpe:/a:symantec:endpoint_protection

© SecPod Technologies