what you don't know can hurt you
Showing 1 - 25 of 30 RSS Feed

Files

Symantec Endpoint Protection 11.x / 12.x Kernel Pool Overflow
Posted Aug 5, 2014
Authored by Matteo Memelli, sickness

Symantec Endpoint Protection versions 11.x and 12.x suffer from a kernel pool overflow vulnerability.

tags | exploit, overflow, kernel
advisories | CVE-2014-3434
MD5 | f34e94fc45f69fbf037858196c0221b6

Related Files

Symantec Endpoint Protection Race Condition
Posted May 5, 2020
Authored by Ofir Moskovitch

Symantec Endpoint Protection versions 14.2.5323.2000, 14.2.5569.2100, and 14.2.5587.2100 suffer from a race condition vulnerability.

tags | advisory
MD5 | 362ddefd14080d3e379be0cf931aba47
Symantec Endpoint Protection Information Disclosure / Privilege Escalation
Posted Dec 6, 2019
Authored by Kyriakos Economou | Site labs.nettitude.com

A malicious application can take advantage of a vulnerability in Symantec Endpoint Protection to leak privileged information and/or execute code with higher privileges, thus taking full control over the affected host. Symantec Endpoint Protection versions 14.x below 14.2 (RU1) and 12.x below 12.1 (RU6 MP10) are affected. Symantec Endpoint Protection Small Business Edition versions 12.x below 12.1 (RU6 MP10c) are affected.

tags | advisory, info disclosure
advisories | CVE-2019-12750
MD5 | adaa581b77f7d19cd5f1123812a01cb9
Symantec Encryption Desktop And Endpoint Encryption Local Privilege Escalation
Posted Dec 1, 2017
Authored by Kyriakos Economou

Vulnerabilities in Symantec Encryption Desktop and Endpoint Encryption allow an attacker to attain arbitrary hard disk read and write access at sector level, and subsequently infect the target and gain low level persistence (MBR/VBR). They also allow the attacker to execute code in the context of the built-in SYSTEM user account, without requiring a reboot.

tags | advisory, arbitrary, vulnerability
MD5 | 752b5f20f45e330229cf021d93af510f
Symantec Endpoint Protection 12.1.6 Tamper Protection Bypass
Posted Nov 12, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symantec Endpoint Protection version 12.1.6 suffers from a tamper protection bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2017-6331
MD5 | a388095559ccdfc375dc8c0bc9cc2a2c
Symantec Endpoint Protection 12.1 CSRF / XSS / Open Redirect
Posted Jun 30, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symantec Endpoint Protection Manager and Client version 12.1 suffers from cross site request forgery, cross site scripting, and open redirection vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2016-3652, CVE-2016-3653, CVE-2016-5304
MD5 | 7ffb2e34fe50285c721b4aedd83c7b4b
Symantec Endpoint Protection Manager Authentication Bypass / Code Execution
Posted Aug 17, 2015
Authored by Brandon Perry, Markus Wulftange | Site metasploit.com

This Metasploit module exploits three separate vulnerabilities in Symantec Endpoint Protection Manager in order to achieve a remote shell on the box as NT AUTHORITY\SYSTEM. The vulnerabilities include an authentication bypass, a directory traversal and a privilege escalation to get privileged code execution.

tags | exploit, remote, shell, vulnerability, code execution
advisories | CVE-2015-1486, CVE-2015-1487, CVE-2015-1489
MD5 | 94d61c5829628370b82e3454cfc59b31
Symantec Endpoint Protection 12.1 Bypass / Privilege Escalation / SQL Injection
Posted Aug 1, 2015
Authored by Markus Wulftange

Symantec Endpoint Protection versions 12.1 prior to 12.1 RU6 MP1 suffer from bypass, file write/read, privilege escalation, remote SQL injection, and traversal vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, bypass, file inclusion
advisories | CVE-2015-1492
MD5 | 17f90eab19f2dc644dd32170d8f4eb5e
Symantec Endpoint Protection 12.1.4023.4080 XXE / XSS / Arbitrary File Write
Posted Nov 6, 2014
Authored by S. Viehbock | Site sec-consult.com

Symantec Endpoint Protection version 12.1.4023.4080 suffers from XXE injection, cross site scripting, and arbitrary file write vulnerabilities.

tags | exploit, arbitrary, vulnerability, xss, xxe
advisories | CVE-2014-3437, CVE-2014-3438, CVE-2014-3439
MD5 | f6fb226d1e2212ecf7f04c4de57782a7
Symantec Endpoint Protection Manager 12.1.4023.4080 Login Bruteforce
Posted Jul 22, 2014
Authored by Andrea Bodei, Sisco Barrera, A. Tsvetkov | Site A2secure.com

Symantec Endpoint Protection Manager version 12.1.4023.4080 suffers from a login bruteforcing vulnerability.

tags | exploit, cracker
MD5 | ffbb04c68396f9de185c389bb97ce74e
SEP Manager 12.1.2015.2015 Overflow Proof Of Concept
Posted Apr 28, 2014
Authored by Jerome Nokin

Symantec Endpoint Protection Manager version 12.1.2015.2015 SEH overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
systems | unix
advisories | CVE-2013-1612
MD5 | 71d31144dd6847abf9a9a81a58790df6
SePortal 2.5 SQL Injection / Remote Code Execution
Posted Mar 28, 2014
Authored by xistence, jsass | Site metasploit.com

This Metasploit module exploits a vulnerability found in SePortal version 2.5. When logging in as any non-admin user, it's possible to retrieve the admin session from the database through SQL injection. The SQL injection vulnerability exists in the "staticpages.php" page. This hash can be used to take over the admin user session. After logging in, the "/admin/downloads.php" page will be used to upload arbitrary code.

tags | exploit, arbitrary, php, sql injection
advisories | CVE-2008-5191, OSVDB-46567
MD5 | 63435169c72cc2d2e9cc30ef51896580
SePortal 2.5 SQL Injection
Posted Mar 19, 2014
Authored by jsass

SePortal version 2.5 suffers from a remote SQL injection vulnerability in the sp_id variable of staticpages.php. This version has already had known SQL injection vulnerabilities noted in 2011.

tags | exploit, remote, php, vulnerability, sql injection
MD5 | f51d1357d4d3888c9747456feb1d399a
Symantec Endpoint Protection Manager Remote Command Execution
Posted Feb 26, 2014
Authored by Chris Graham, Stefan Viehbock | Site metasploit.com

This Metasploit module exploits XXE and SQL injection flaws in Symantec Endpoint Protection Manager versions 11.0, 12.0 and 12.1. When supplying a specially crafted XXE request an attacker can reach SQL injection affected components. As xp_cmdshell is enabled in the included database instance, it's possible to execute arbitrary system commands on the remote system with SYSTEM privileges.

tags | exploit, remote, arbitrary, sql injection, xxe
advisories | CVE-2013-5014, CVE-2013-5015
MD5 | 3d5e8769437aef3160d16a8ac935fe7c
Symantec Endpoint Protection Manager Remote Command Execution
Posted Feb 23, 2014
Authored by Chris Graham

Symantec Endpoint Protection Manager suffers from a remote command execution vulnerability. Versions 11.0, 12.0, and 12.1 are affected.

tags | exploit, remote
advisories | CVE-2013-5014, CVE-2013-5015
MD5 | d4252d67483e639a0b6b1d86f7660eb4
Symantec Endpoint Protection 11.0 / 12.0 / 12.1 XXE / SQL Injection
Posted Feb 19, 2014
Authored by S. Viehbock | Site sec-consult.com

Symantec Endpoint Protection versions 11.0, 12.0, and 12.1 suffer from unauthenticated XML external entity injection and unauthenticated local SQL injection vulnerabilities.

tags | advisory, local, vulnerability, sql injection, xxe
advisories | CVE-2013-5014, CVE-2013-5015
MD5 | e1dfb43c1297d5ce77dadc1b62edf4d6
Secunia Security Advisory 51527
Posted Dec 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Symantec Endpoint Protection, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | b20767326b10663b4ec285dbd98142a1
Zero Day Initiative Advisory 12-145
Posted Aug 23, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-145 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Endpoint Protection. Authentication is not required to exploit this vulnerability. The specific flaw exists within SemSvc.exe which listens by default on TCP port 8443 (https). The SemSvc service exposes a servlet called 'AgentServlet" which allows remote users to activate certain tasks without prior authentication. In doing so, it is vulnerable to directory traversal attacks and arbitrary file deletion. When certain files are deleted, the eval() method will allow for executing user supplied commands. An attacker can leverage these vulnerabilities to execute code under the context of the SYSTEM.

tags | advisory, remote, web, arbitrary, tcp, vulnerability
advisories | CVE-2012-0289
MD5 | ed1b48f53594389568af798573e35c7f
Secunia Security Advisory 49248
Posted May 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Endpoint Protection, which can be exploited by malicious people to manipulate certain data or compromise a vulnerable system.

tags | advisory
MD5 | b6e8ae8b663b02957ab036412003bd8c
Secunia Security Advisory 49221
Posted May 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Endpoint Protection, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | f1c781a3c3d473b87e42677e775eeefa
Sepehr-Team Open Redirect
Posted Mar 3, 2012
Authored by l20ot

Sepehr-Team suffers from an open redirection vulnerability.

tags | exploit
MD5 | 6115b960384ddae3a1ec08bdc55f6d00
SePortal 2.5 SQL Injection
Posted Dec 9, 2011
Authored by Don from BalcanCrew

SePortal version 2.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 496666e10a8d51f887d37677dc5bfdf4
Secunia Security Advisory 43662
Posted Aug 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Symantec Endpoint Protection Manager, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
MD5 | f5f3f372de141fdd7cef1dde74d6eb5b
Secunia Security Advisory 42643
Posted Dec 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symantec Endpoint Protection Manager, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | 8d48eb9a3310696fdc6b2b1cbeb95171
Zero Day Initiative Advisory 10-291
Posted Dec 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-291 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Endpoint Protection. Authentication is not required to exploit this vulnerability. The specific flaw exists within the portion of the server that generates reports. Due to the combination of insufficient checks being performed on the application and failure to authenticate a user for generating a chart, an attacker can overwrite arbitrary files on a server. Careful exploitation can lead to code execution under the context of the php interpreter.

tags | advisory, remote, arbitrary, php, code execution
advisories | CVE-2010-0114
MD5 | c479cbc2463c664a3c586fc18b60b077
Sepcity Lawyer Portal SQL Injection
Posted Dec 31, 2008
Authored by Osmanizim | Site osmanizim.com

Sepcity Lawyer Portal suffers from a remote SQL injection vulnerability in deptdisplay.asp.

tags | exploit, remote, sql injection, asp
MD5 | dd9e668bfd0a29b2047d0b0b3b50ddf4
Page 1 of 2
Back12Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    3 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    33 Files
  • 26
    Oct 26th
    27 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close