Page 83 of 598 results (0.006 seconds)

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 0

Multiple vulnerabilities in Symantec Ghost Solution Suite 2.0.0 and earlier, with Ghost 8.0.992 and possibly other versions, allow remote attackers to cause a denial of service (client or server crash) via malformed requests to the daemon port, 1346/udp or 1347/udp. Múltiples vulnerabilidades en Symantec Ghost Solution Suite 2.0.0 y versiones anteriores, con Ghost 8.0.992 y posiblemente otra versiones, permiten a atacantes remotos provocar una denegación de servicio (caída de cliente o servidor) mediante peticiones malformadas al puerto del demonio, 1346/udp ó 1347/udp. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=540 http://osvdb.org/36106 http://secunia.com/advisories/25539 http://securityreason.com/securityalert/2805 http://www.securityfocus.com/archive/1/470644/100/0/threaded http://www.securityfocus.com/bid/24323 http://www.securitytracker.com/id?1018200 http://www.symantec.com/avcenter/security/Content/2007.06.05b.html http://www.vupen.com/english/advisories/2007/2075 https://exchange.xforce.ibmcloud.com/vulnerabilities/ •

CVSS: 9.0EPSS: 0%CPEs: 11EXPL: 0

Unspecified vulnerability in Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, allows attackers to "disable the authentication system" and bypass authentication via unknown vectors. Vulnerabilidad no especificada en Symantec Reporting Server 1.0.197.0, y otras versiones anteriores a 1.0.224.0, como el usado en Symantec Client Security 3.1 y posteriores, y Symantec AntiVirus Corporate Edition (SAV CE) 10.1 y posteriores, permite a atacantes remotos "deshabilitar el sistema de autenticación" y evitar la autenticación mediante vectores no especificados. • http://osvdb.org/36107 http://secunia.com/advisories/25543 http://www.securityfocus.com/bid/24325 http://www.securitytracker.com/id?1018196 http://www.symantec.com/avcenter/security/Content/2007.06.05.html http://www.vupen.com/english/advisories/2007/2074 https://exchange.xforce.ibmcloud.com/vulnerabilities/34895 •

CVSS: 9.3EPSS: 1%CPEs: 3EXPL: 0

Stack-based buffer overflow in XferWan.exe as used in multiple products including (1) Symantec Discovery 6.5, (2) Numara Asset Manager 8.0, and (3) Centennial UK Ltd Discovery 2006 Feature Pack, allows remote attackers to execute arbitrary code via a long request. NOTE: this might be a reservation duplicate of CVE-2007-1173. Desbordamiento de búfer basado en pila en el XferWan.exe como el utilizado en múltiples productos incluidos (1) Symantec Discovery 6.5, (2) Numara Asset Manager 8.0 y (3) Centennial UK Ltd Discovery 2006 Feature Pack, permite a atacantes remotos ejecutar código de su elección a través de una petición larga. NOTA: esta vulnerabilidad puede ser una réplica de la CVE-2007-1173. • http://dvlabs.tippingpoint.com/advisory/TPTI-07-10 http://osvdb.org/42059 http://securityreason.com/securityalert/2785 http://www.securityfocus.com/archive/1/470563/100/0/threaded http://www.securityfocus.com/bid/24317 http://www.securitytracker.com/id?1018191 https://exchange.xforce.ibmcloud.com/vulnerabilities/34723 •

CVSS: 7.5EPSS: 1%CPEs: 11EXPL: 0

Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, does not initialize a critical variable, which allows attackers to create arbitrary executable files via unknown manipulations of a file that is created during data export. Symantec Reporting Server 1.0.197.0, y otras versiones anteriores a 1.0.224.0, como se usan en Symantec Client Security 3.1 y posteriores, y Symantec AntiVirus Corporate Edition (SAV CE) 10.1 y posteriores, no inicializa una variable crítica, lo cual permite a los atacantes crear archivos ejecutables de su elección mediante manipulaciones desconocidas de un archivo que se crea durante la exportación de datos. • http://osvdb.org/36109 http://secunia.com/advisories/25543 http://www.securityfocus.com/bid/24313 http://www.securitytracker.com/id?1018196 http://www.symantec.com/avcenter/security/Content/2007.06.05a.html http://www.vupen.com/english/advisories/2007/2074 https://exchange.xforce.ibmcloud.com/vulnerabilities/34744 •

CVSS: 4.3EPSS: 5%CPEs: 11EXPL: 0

Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, displays the password hash for a user after a failed login attempt, which makes it easier for remote attackers to conduct brute force attacks. Symantec Reporting Server 1.0.197.0, y otras versiones anteriores a 1.0.224.0, como se usan en Symantec Client Security 3.1 y posteriores, y Symantec AntiVirus corporate Edition (SAV CE) 10.1 y posteriores, muestra el resumen (hash) de la contraseña para un usuario tras un intento de acceso fallido, lo cual facilita a atacantes remotos llevar a cabo ataques de fuerza bruta. • http://osvdb.org/36108 http://secunia.com/advisories/25543 http://www.securityfocus.com/bid/24312 http://www.securitytracker.com/id?1018196 http://www.symantec.com/avcenter/security/Content/2007.06.05.html http://www.vupen.com/english/advisories/2007/2074 https://exchange.xforce.ibmcloud.com/vulnerabilities/34740 •