4 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

Multiple unquoted Windows search path vulnerabilities in the (1) Manager and (2) Agent components in Symantec Enterprise Security Manager (ESM) before 11.0 allow local users to gain privileges via unspecified vectors. Múltiples vulnerabilidades en ruta de búsqueda en Windows en los componentes (1) Manager y (2) Agent en Symantec Enterprise Security Manager (ESM) antes de v11.0, permite a usuarios locales ganar privilegios a través de vectores no especificados. • http://www.securityfocus.com/bid/56915 http://www.securitytracker.com/id?1027874 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20121213_00 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Race condition in the Symantec Enterprise Security Manager (ESM) 6.5.3 managers and agents on Windows before 20070524 allows remote attackers to cause a denial of service (CPU consumption and application hang) via certain network scans to ESM ports. Condición de carrera en los encargados y agentes de Symantec Enterprise Security Manager (ESM) 6.5.3 en Windows anteriores a la fecha 24/05/2007 permite a atacantes remotos causar una denegación de servicio (agotamiento de la CPU y cuelgue de aplicación) a través de determinados escaneos de red a los puertos ESM. • http://osvdb.org/35077 http://secunia.com/advisories/25390 http://securityresponse.symantec.com/avcenter/security/Content/2007.05.24a.html http://securityresponse.symantec.com/avcenter/security/Content/2007.05.24b.html http://www.securityfocus.com/bid/24123 http://www.securitytracker.com/id?1018120 http://www.vupen.com/english/advisories/2007/1940 https://exchange.xforce.ibmcloud.com/vulnerabilities/34507 •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 0

The agent remote upgrade interface in Symantec Enterprise Security Manager (ESM) before 20070405 does not verify the authenticity of upgrades, which allows remote attackers to execute arbitrary code via software that implements the agent upgrade protocol. El agente remoto de la interfaz de actualización en Symantec Enterprise Security Manager (ESM) anterior a 20070405 no verifica la autenticidad de las actualizaciones, lo cual permite a un atacante remoto ejecutar código de su elección a través de software que implemente el agente del protocolo de actualización. • http://secunia.com/advisories/24767 http://www.securityfocus.com/bid/23287 http://www.securitytracker.com/id?1017881 http://www.symantec.com/avcenter/security/Content/2007.04.05d.html http://www.vupen.com/english/advisories/2007/1277 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

The manager server in Symantec Enterprise Security Manager (ESM) 6 and 6.5.x allows remote attackers to cause a denial of service (hang) via a malformed ESM agent request. El servidor de administración en Symantec Enterprise Security Manager (ESM) 6 y 6.5.x permite a atacantes remotos provocar una denegación de servicio (la aplicación no responde) mediante una petición de agente ESM mal formada. • http://secunia.com/advisories/21548 http://securityreason.com/securityalert/1437 http://securitytracker.com/id?1016728 http://www.osvdb.org/28108 http://www.securityfocus.com/archive/1/444068/100/0/threaded http://www.securityfocus.com/bid/19580 http://www.symantec.com/avcenter/security/Content/2006.08.21a.html http://www.vupen.com/english/advisories/2006/3353 •