[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6 MP10 or 14.x before 14.2 and is prone to a AV bypass vulnerability. A flaw is present in the application, which fails to handle an unknown code block of the component detection engine. Successful exploitation could allow attackers to bypass the antivirus and alter the file being scanned so it is not detected.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 through 12.1 RU6 MP10 or 14.x before 14.2 RU1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a specially crafted IRP request. Successful exploitation could allow attackers to disclose the kernel memory.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 or 14.x before 14.0 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to interpret and evaluate the file metadata as a formula.

The host is installed with Symantec Endpoint Protection (SEP) Client 12.1 before 12.1 RU6-MP9 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to perform multiple file and directory writes to the local filesystem.

The host is installed with Symantec Anti-Virus Engine (AVE) 20151.1 before 20151.1.1.4 (Symantec Endpoint Protection) and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed PE header file. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory access violation and system ...

The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle flood of packets. Successful exploitation could allow attackers to crash the service.

The host is installed with Symantec AntiVirus Corporate Edition 9.0 MR6 and earlier before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the applications, which fail to validate data sent t ...

The host is installed with Symantec AntiVirus Corporate Edition 9 before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a design error in XFR.EXE. Successful exploita ...

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 or 14.x before 14.0 MP1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file metadata. Successful exploitation could allow attackers to interpret and evaluate the file metadata as a formula.

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6-MP7 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to sanitize logged-in user input. Successful exploitation could allow attackers to run arbitrary code on the local machine with kernel-level privileges.


Pages:      Start    1359    1360    1361    1362    1363    1364    1365    1366    1367    1368    1369    1370    1371    1372    ..   1502

© SecPod Technologies