exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files

Symantec Endpoint Protection 11.x / 12.x Kernel Pool Overflow
Posted Aug 5, 2014
Authored by Matteo Memelli, sickness

Symantec Endpoint Protection versions 11.x and 12.x suffer from a kernel pool overflow vulnerability.

tags | exploit, overflow, kernel
advisories | CVE-2014-3434
SHA-256 | 4336ac24272f9e03af411eafef0734ba3a8c0d939a93fed5265bff19cf5612fe

Related Files

Symantec Endpoint Protection Information Disclosure / Privilege Escalation
Posted Dec 6, 2019
Authored by Kyriakos Economou | Site labs.nettitude.com

A malicious application can take advantage of a vulnerability in Symantec Endpoint Protection to leak privileged information and/or execute code with higher privileges, thus taking full control over the affected host. Symantec Endpoint Protection versions 14.x below 14.2 (RU1) and 12.x below 12.1 (RU6 MP10) are affected. Symantec Endpoint Protection Small Business Edition versions 12.x below 12.1 (RU6 MP10c) are affected.

tags | advisory, info disclosure
advisories | CVE-2019-12750
SHA-256 | ba684560b58492719e146b7962feca0b68d0d97a728a6b906962fa4a1fc92df6
Symantec Encryption Desktop And Endpoint Encryption Local Privilege Escalation
Posted Dec 1, 2017
Authored by Kyriakos Economou

Vulnerabilities in Symantec Encryption Desktop and Endpoint Encryption allow an attacker to attain arbitrary hard disk read and write access at sector level, and subsequently infect the target and gain low level persistence (MBR/VBR). They also allow the attacker to execute code in the context of the built-in SYSTEM user account, without requiring a reboot.

tags | advisory, arbitrary, vulnerability
SHA-256 | c552a0d5a2f17481d112b351045fec72aa1777dac0c1e90c745138d741a25e68
Symantec Endpoint Protection 12.1.6 Tamper Protection Bypass
Posted Nov 12, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symantec Endpoint Protection version 12.1.6 suffers from a tamper protection bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2017-6331
SHA-256 | fb2bdba6aaf5eaee7b0bcd2b259b1c8a74c039dc66fcf7b2c9ba691f4e274fa7
Symantec Endpoint Protection 12.1 CSRF / XSS / Open Redirect
Posted Jun 30, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symantec Endpoint Protection Manager and Client version 12.1 suffers from cross site request forgery, cross site scripting, and open redirection vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2016-3652, CVE-2016-3653, CVE-2016-5304
SHA-256 | 65b13d36661ece87ba1bdd49bd3f70a0e5b540ef29bbd7ab7cc57d9d5d95b4ac
Symantec Endpoint Protection Manager Authentication Bypass / Code Execution
Posted Aug 17, 2015
Authored by Brandon Perry, Markus Wulftange | Site metasploit.com

This Metasploit module exploits three separate vulnerabilities in Symantec Endpoint Protection Manager in order to achieve a remote shell on the box as NT AUTHORITY\SYSTEM. The vulnerabilities include an authentication bypass, a directory traversal and a privilege escalation to get privileged code execution.

tags | exploit, remote, shell, vulnerability, code execution
advisories | CVE-2015-1486, CVE-2015-1487, CVE-2015-1489
SHA-256 | 55479cb3065f838f82cc61df0c4fdee54d41ee44aace24351aecba453e3be8c5
Symantec Endpoint Protection 12.1 Bypass / Privilege Escalation / SQL Injection
Posted Aug 1, 2015
Authored by Markus Wulftange

Symantec Endpoint Protection versions 12.1 prior to 12.1 RU6 MP1 suffer from bypass, file write/read, privilege escalation, remote SQL injection, and traversal vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, bypass, file inclusion
advisories | CVE-2015-1492
SHA-256 | 3f5a3cfc1bc3b78c5647dfc0b895bed91d7231c04c302aa544d87d1b9315faff
Symantec Endpoint Protection 12.1.4023.4080 XXE / XSS / Arbitrary File Write
Posted Nov 6, 2014
Authored by S. Viehbock | Site sec-consult.com

Symantec Endpoint Protection version 12.1.4023.4080 suffers from XXE injection, cross site scripting, and arbitrary file write vulnerabilities.

tags | exploit, arbitrary, vulnerability, xss, xxe
advisories | CVE-2014-3437, CVE-2014-3438, CVE-2014-3439
SHA-256 | 8dac04a3f8aa31944840699e39fc5cb46e42c335bda4f13704749fd690e88f91
Symantec Endpoint Protection Manager 12.1.4023.4080 Login Bruteforce
Posted Jul 22, 2014
Authored by Andrea Bodei, Sisco Barrera, A. Tsvetkov | Site A2secure.com

Symantec Endpoint Protection Manager version 12.1.4023.4080 suffers from a login bruteforcing vulnerability.

tags | exploit, cracker
SHA-256 | 1e661a8c09156f956396edab48221b93e781c568c449f5549e4a86cf7f977edb
SEP Manager 12.1.2015.2015 Overflow Proof Of Concept
Posted Apr 28, 2014
Authored by Jerome Nokin

Symantec Endpoint Protection Manager version 12.1.2015.2015 SEH overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
systems | unix
advisories | CVE-2013-1612
SHA-256 | 8bee128e1781c61bead3c3b0efa4f85a7a42194ff51d0beaf8d2d0e973d01216
SePortal 2.5 SQL Injection / Remote Code Execution
Posted Mar 28, 2014
Authored by xistence, jsass | Site metasploit.com

This Metasploit module exploits a vulnerability found in SePortal version 2.5. When logging in as any non-admin user, it's possible to retrieve the admin session from the database through SQL injection. The SQL injection vulnerability exists in the "staticpages.php" page. This hash can be used to take over the admin user session. After logging in, the "/admin/downloads.php" page will be used to upload arbitrary code.

tags | exploit, arbitrary, php, sql injection
advisories | CVE-2008-5191, OSVDB-46567
SHA-256 | 523ae89437abd95ee2b8adbfe4b6eb79e71f45e8218d4bcec51f35af6aab99d6
SePortal 2.5 SQL Injection
Posted Mar 19, 2014
Authored by jsass

SePortal version 2.5 suffers from a remote SQL injection vulnerability in the sp_id variable of staticpages.php. This version has already had known SQL injection vulnerabilities noted in 2011.

tags | exploit, remote, php, vulnerability, sql injection
SHA-256 | 8f4257a80f761be925bfdf6c5c86b1aa0a890871ff237d0be07eb7a35351f1e2
Symantec Endpoint Protection Manager Remote Command Execution
Posted Feb 26, 2014
Authored by Chris Graham, Stefan Viehboeck | Site metasploit.com

This Metasploit module exploits XXE and SQL injection flaws in Symantec Endpoint Protection Manager versions 11.0, 12.0 and 12.1. When supplying a specially crafted XXE request an attacker can reach SQL injection affected components. As xp_cmdshell is enabled in the included database instance, it's possible to execute arbitrary system commands on the remote system with SYSTEM privileges.

tags | exploit, remote, arbitrary, sql injection, xxe
advisories | CVE-2013-5014, CVE-2013-5015
SHA-256 | ef19d7abd0e99695337b2df4433d4785cfa21593bd61b704d3aa78a9d8ce5183
Symantec Endpoint Protection Manager Remote Command Execution
Posted Feb 23, 2014
Authored by Chris Graham

Symantec Endpoint Protection Manager suffers from a remote command execution vulnerability. Versions 11.0, 12.0, and 12.1 are affected.

tags | exploit, remote
advisories | CVE-2013-5014, CVE-2013-5015
SHA-256 | 1230fa397327e1f414c650a845b08b3ed515236c94fa13a2c1c80e976a099209
Symantec Endpoint Protection 11.0 / 12.0 / 12.1 XXE / SQL Injection
Posted Feb 19, 2014
Authored by S. Viehbock | Site sec-consult.com

Symantec Endpoint Protection versions 11.0, 12.0, and 12.1 suffer from unauthenticated XML external entity injection and unauthenticated local SQL injection vulnerabilities.

tags | advisory, local, vulnerability, sql injection, xxe
advisories | CVE-2013-5014, CVE-2013-5015
SHA-256 | 8dc0a7d04b4648d74f8859b867b10ed25093390acfa65b509cef76bb983b8a1a
Secunia Security Advisory 51527
Posted Dec 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Symantec Endpoint Protection, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 52549cd98fd8ef6cd8f0a66cb9f8cfa55d79f04ae18d5f25362fbb55b85414b1
Zero Day Initiative Advisory 12-145
Posted Aug 23, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-145 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Endpoint Protection. Authentication is not required to exploit this vulnerability. The specific flaw exists within SemSvc.exe which listens by default on TCP port 8443 (https). The SemSvc service exposes a servlet called 'AgentServlet" which allows remote users to activate certain tasks without prior authentication. In doing so, it is vulnerable to directory traversal attacks and arbitrary file deletion. When certain files are deleted, the eval() method will allow for executing user supplied commands. An attacker can leverage these vulnerabilities to execute code under the context of the SYSTEM.

tags | advisory, remote, web, arbitrary, tcp, vulnerability
advisories | CVE-2012-0289
SHA-256 | f61f4ce29b8d52c4a9c1b37082ef4cd64b59d5ec479c79388cbea56bd8342bed
Secunia Security Advisory 49248
Posted May 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Endpoint Protection, which can be exploited by malicious people to manipulate certain data or compromise a vulnerable system.

tags | advisory
SHA-256 | de6d574f42530ef6795ad183e051ae3433ae6e4baec1150585490234da350ed4
Secunia Security Advisory 49221
Posted May 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Endpoint Protection, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | fcd37ccd1f83398f7d9ff17d77b6bc7ececbc5205ca1d352740a95f539198d5b
Sepehr-Team Open Redirect
Posted Mar 3, 2012
Authored by l20ot

Sepehr-Team suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 425ad6ce48ac9037f30a67a94fb5b5ebcf57b4a28d8a703eb34be04267238748
SePortal 2.5 SQL Injection
Posted Dec 9, 2011
Authored by Don from BalcanCrew

SePortal version 2.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | dea9743f95ed23a9a24fa1697fd0934e16e1afa180ab42f7f2fd042cad1739ae
Secunia Security Advisory 43662
Posted Aug 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Symantec Endpoint Protection Manager, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
SHA-256 | c22d79cbb65d987e3a7ffd72809ecd4044d10ea30f0121ab04f7686bf4bdbbde
Secunia Security Advisory 42643
Posted Dec 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Endpoint Protection Manager, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 7abc75ae39addfa540ba0ff661365bfcca87d075d1ce779d79b9c051769ca7dc
Zero Day Initiative Advisory 10-291
Posted Dec 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-291 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Endpoint Protection. Authentication is not required to exploit this vulnerability. The specific flaw exists within the portion of the server that generates reports. Due to the combination of insufficient checks being performed on the application and failure to authenticate a user for generating a chart, an attacker can overwrite arbitrary files on a server. Careful exploitation can lead to code execution under the context of the php interpreter.

tags | advisory, remote, arbitrary, php, code execution
advisories | CVE-2010-0114
SHA-256 | 00916da4001ed315f468080d322bf53cff8f654bb961279e9066d04487ac97b0
Sepcity Lawyer Portal SQL Injection
Posted Dec 31, 2008
Authored by Osmanizim | Site osmanizim.com

Sepcity Lawyer Portal suffers from a remote SQL injection vulnerability in deptdisplay.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 082f5a4ff4441a7b5a9fd96a5f812734d25fcc65da1f0aa0685bbc000e29953b
Sepcity Shopping Mall SQL Injection
Posted Dec 31, 2008
Authored by Osmanizim | Site osmanizim.com

Sepcity Shopping Mall suffers from a remote SQL injection vulnerability in shpdetails.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 541fbf8d99ebbf95ba35c9832226ab3c45f14a787298ba49a418b8d8b90a06d2
Page 1 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close