[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Symantec AntiVirus Corporate Edition 9 before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a design error in XFR.EXE. Successful exploita ...

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 or 14.x before 14.0 MP1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to interpret and evaluate the file metadata as a formula.

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to sanitize logged-in user input. Successful exploitation could allow attackers to run arbitrary code on the local machine with kernel-level privileges.

The host is installed with Symantec AntiVirus (SAV) before 10.1 MR8, Symantec Endpoint Protection (SEP) 11.0 before 11.0 MR1, Norton 360 1.0, or Norton Internet Security 2005 through 2008, and is prone to multiple cross site scripting vulnerabilities. The flaws are present in the applications, which fail to handle a crafted e-mail message. Successful exploitation could allow attackers to execute a ...

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 through 12.1 RU6 MP10 or 14.x before 14.2 RU1 and is prone to a DLL Preloading vulnerability. A flaw is present in the application, which fails to handle when an application looks to call a DLL for execution. Successful exploitation could allow attackers to execute arbitrary code in the context of the affected application.

The host is installed with Symantec Endpoint Protection (SEP) 12.x through 12.1 RU6 MP10 or 14.x before 14.2 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software application to gain elevated access to resources that are normally protected fr ...

The host is installed with WinSCP before 5.5.3 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate. Successful exploitation could allow man-in-the-middle attackers to spoof SSL servers via an arbitrary va ...

The host is installed with Trillian through 3.1.9.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted DTD file. Successful exploitation could allow attackers to cause a denial of service (crash) and possibly execute arbitrary code.

The host is installed with Trillian 3.1.9.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long nickname in an MSN protocol message. Successful exploitation could allow attackers to to execute arbitrary code.

The host is installed with Trillian before 3.1.10.0 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a malformed attribute in an IMG tag. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1397    1398    1399    1400    1401    1402    1403    1404    1405    1406    1407    1408    1409    1410    ..   1516

© SecPod Technologies