PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 706

of 36

Published:   Updated:

Vulnerability Type: Memory corruption

Vendor(s):  Symantec
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Symantec Protection Engine, prior to 9.1.0, may be susceptible to a Hash Leak vulnerability.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Symantec
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

An authenticated user can see and modify the value for ‘next’ query parameter in Symantec Identity Portal 14.4

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

A user can supply malicious HTML and JavaScript code that will be executed in the client browser

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

Ability to enumerate the Oracle LDAP attributes for the current user by modifying the query used by the application

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

User’s supplied input (usually a CRLF sequence) can be used to split a returning response into two responses.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

An authenticated user can supply malicious HTML and JavaScript code that will be executed in the client browser.

Published:   Updated:

Vulnerability Type: Privilege escalation

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

Symantec Endpoint Protection, prior to 14.3 RU6 (14.3.9210.6000), may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated

Published:   Updated:

Vulnerability Type: Xxe

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

An authenticated user can perform XML eXternal Entity injection in Management Console in Symantec Identity Manager 14.4

Published:   Updated:

Vulnerability Type: Command injection

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.7

An authenticated administrator who has physical access to the environment can carry out Remote Command Execution on Management Console in Symantec Identity Manager 14.4

Published:   Updated:

Vulnerability Type: Session fixation

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

An unauthenticated user can access Identity Manager’s management console specific page URLs. However, the system doesn’t allow the user to carry out server side tasks without a valid web session.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Symantec
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

An authenticated user can embed malicious content with XSS into the admin group policy page.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Symantec
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

An authenticated user who has the privilege to add/edit annotations on the Content tab, can craft a malicious annotation that can be executed on the annotations page (Annotation Text Column).

Published:   Updated:

Vulnerability Type: Security feature bypass

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Symantec Endpoint Protection (Windows) agent, prior to 14.3 RU6/14.3 RU5 Patch 1, may be susceptible to a Security Control Bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing security controls. This CVE applies narrowly to the Client User Interface Password protection and Policy Import/Export Password protection, if it has been enabled.

Published:   Updated:

Vulnerability Type: Privilege escalation

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Symantec Endpoint Protection (Windows) agent may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

Published:   Updated:

Vulnerability Type: Privilege escalation

Vendor(s):  Symantec
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Symantec Endpoint Detection and Response (SEDR) Appliance, prior to 4.7.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

A malicious unauthorized PAM user can access the administration configuration data and change the values.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v24CVSS v34.9

A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access.

Published:   Updated:

Vulnerability Type: Open redirect

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v25.8CVSS v36.1

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Netegrity SiteMinder up to 4.5.1 and classified as critical. Affected by this issue is the file /siteminderagent/pwcgi/smpwservicescgi.exe of the component Login. The manipulation of the argument target leads to an open redirect. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Published:   Updated:

Vulnerability Type: Privilege escalation

Vendor(s):  Symantec
Significant
Remediate Within one Month
CVSS v27.2CVSS v37.8

The Symantec Management Agent is susceptible to a privilege escalation vulnerability. A low privilege local account can be elevated to the SYSTEM level through registry manipulations.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v29CVSS v39.8

The Symantec Advanced Secure Gateway (ASG) and ProxySG web management consoles are susceptible to an authentication bypass vulnerability. An unauthenticated attacker can execute arbitrary CLI commands, view/modify the appliance configuration and policy, and shutdown/restart the appliance.

of 36