Page 2 of 10 results (0.006 seconds)

CVSS: 7.8EPSS: 15%CPEs: 11EXPL: 1

Buffer overflow in Symantec pcAnywhere 11.0.1, 11.5.1, and all other 32-bit versions allows remote attackers to cause a denial of service (application crash) via unknown attack vectors. • https://www.exploit-db.com/exploits/26665 http://secunia.com/advisories/17797 http://securitytracker.com/id?1015284 http://www.securityfocus.com/bid/15646 http://www.symantec.com/avcenter/security/Content/2005.11.29.html http://www.vupen.com/english/advisories/2005/2658 https://exchange.xforce.ibmcloud.com/vulnerabilities/23298 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Symantec pcAnywhere 10.5x and 11.x before 11.5, with "Launch with Windows" enabled, allows local users with physical access to execute arbitrary commands via the Caller Properties feature. • http://secunia.com/advisories/15673 http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html http://securitytracker.com/id?1014178 http://www.securityfocus.com/bid/13933 •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 2

pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap. • https://www.exploit-db.com/exploits/19880 http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html http://www.iss.net/security_center/static/4347.php http://www.osvdb.org/1301 http://www.securityfocus.com/bid/1150 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000425150157.13567A-100000%40sword.damocles.com •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

PCAnywhere allows remote attackers to cause a denial of service by terminating the connection before PCAnywhere provides a login prompt. • http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html http://www.securityfocus.com/bid/1095 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 2

The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts. • https://www.exploit-db.com/exploits/19836 http://www.securityfocus.com/bid/1093 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000406030958.23902.qmail%40securityfocus.com •