Download
| Alert*
oval:org.secpod.oval:def:5928
The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle flood of packets. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:55477 The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation c ... oval:org.secpod.oval:def:55476 The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation c ... oval:org.secpod.oval:def:55478 The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 MP1 and is prone to a DLL Preloading vulnerability. A flaw is present in the application, which fails to handle a DLL provided by the attacker when an application is installed unintentionally. Successful exploitation coul ... oval:org.secpod.oval:def:5931 The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted script. Successful exploitation could allow local users to gain privileges. oval:org.secpod.oval:def:9771 The host is installed with Symantec Endpoint Protection 11.0 before 11.0 RU7-MP3 or 12.0 before SEP 12.1 RU2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted inputs to PHP scripts. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:47282 The host is installed with Symantec Endpoint Protection (SEP) Client through 12.1 RU6 MP9 and is prone to a tamper protection bypass. A flaw is present in the application, which fails to handle text alteration in a UI element. Successful exploitation could allow attackers to bypass tamper-protection ... |