Page 4 of 17 results (0.003 seconds)

CVSS: 4.9EPSS: 0%CPEs: 101EXPL: 2

The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data. El driver \Device\SymEvent en Symantec Norton Personal Firewall 2006 9.1.0.33, y otras versiones del Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, y 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0 y 10.1, Symantec pcAnywhere 11.5 y Symantec Host, permite a usuarios locales provocar una denegación de servicio (caída del sistema) vía una información inválida, como ha sido demostrado llamando a DeviceIoControl para enviar la información. • https://www.exploit-db.com/exploits/28588 http://secunia.com/advisories/21938 http://securityreason.com/securityalert/1591 http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html http://securitytracker.com/id?1016889 http://securitytracker.com/id?1016892 http://securitytracker.com/id?1016893 http://securitytracker.com/id?1016894 http://securitytracker.com/id? • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 97%CPEs: 12EXPL: 2

Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors. Desbordamiento de búfer basado en pila en Symantec Antivirus 10.1 y Client Security 3.1 permite a atacantes remotos ejecutar código de su elección vectores de ataque desconocidos. • https://www.exploit-db.com/exploits/16830 http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046355.html http://secunia.com/advisories/20318 http://securityresponse.symantec.com/avcenter/security/Content/2006.05.25.html http://securitytracker.com/id?1016161 http://securitytracker.com/id?1016162 http://www.eeye.com/html/research/upcoming/20060524.html http://www.kb.cert.org/vuls/id/404910 http://www.securityfocus.com/archive/1/435200/100/0/threaded http://www.secur •