Search Results (Refine Search)
- CPE Product Version: cpe:/a:symantec:endpoint_protection:11.0:ru6mp1
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2013-5011 |
Unquoted Windows search path vulnerability in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 allows local users to gain privileges via a crafted program in the %SYSTEMDRIVE% directory. Published: January 10, 2014; 11:47:05 AM -0500 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2013-5010 |
The Application/Device Control (ADC) component in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 does not properly handle custom polices, which allows local users to bypass intended policy restrictions and access files or directories via unspecified vectors. Published: January 10, 2014; 11:47:05 AM -0500 |
V3.x:(not available) V2.0: 4.6 MEDIUM |
CVE-2013-5009 |
The Management Console in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 does not properly perform authentication, which allows remote authenticated users to gain privileges by leveraging access to a limited-admin account. Published: January 10, 2014; 11:47:05 AM -0500 |
V3.x:(not available) V2.0: 7.4 HIGH |
CVE-2012-4348 |
The management console in Symantec Endpoint Protection (SEP) 11.0 before RU7-MP3 and 12.1 before RU2, and Symantec Endpoint Protection Small Business Edition 12.x before 12.1 RU2, does not properly validate input for PHP scripts, which allows remote authenticated users to execute arbitrary code via unspecified vectors. Published: December 18, 2012; 3:55:01 PM -0500 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2010-3268 |
The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request. Published: December 22, 2010; 4:00:15 PM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2010-0114 |
fw_charts.php in the reporting module in the Manager (aka SEPM) component in Symantec Endpoint Protection (SEP) 11.x before 11 RU6 MP2 allows remote attackers to bypass intended restrictions on report generation, overwrite arbitrary PHP scripts, and execute arbitrary code via a crafted request. Published: December 21, 2010; 8:00:02 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |