Symantec Protection Engine, prior to 9.1.0, may be susceptible to a Hash Leak vulnerability.
Max CVSS
6.8
EPSS Score
0.05%
Published
2023-09-27
Updated
2023-09-28
Symantec Endpoint Detection & Response, prior to 4.5, may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.
Max CVSS
7.5
EPSS Score
0.13%
Published
2020-11-18
Updated
2020-11-30
Symantec Endpoint Detection And Response, prior to 4.4, may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.
Max CVSS
7.5
EPSS Score
0.13%
Published
2020-07-08
Updated
2021-07-21
Norton Password Manager, prior to 6.5.0.2104, may be susceptible to an information disclosure issue, which is a type of vulnerability whereby there is an unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.
Max CVSS
5.5
EPSS Score
0.05%
Published
2019-09-17
Updated
2021-07-21
An information disclosure vulnerability in Symantec Reporter web UI 10.3 prior to 10.3.2.5 allows a malicious authenticated administrator user to obtain passwords for external SMTP, FTP, FTPS, LDAP, and Cloud Log Download servers that they might not otherwise be authorized to access. The malicious administrator user can also obtain the passwords of other Reporter web UI users.
Max CVSS
4.9
EPSS Score
0.06%
Published
2019-08-30
Updated
2021-07-21
Symantec Messaging Gateway (prior to 10.7.0), may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.
Max CVSS
4.5
EPSS Score
0.05%
Published
2019-10-24
Updated
2021-07-21
An information disclosure vulnerability in the Management Center (MC) REST API 2.0, 2.1, and 2.2 prior to 2.2.2.1 allows a malicious authenticated user to obtain passwords for external backup and CPL policy import servers that they might not otherwise be authorized to access.
Max CVSS
6.5
EPSS Score
0.06%
Published
2019-08-30
Updated
2021-07-21
Prior to 4.4.1.10, the Norton Family Android App can be susceptible to an Information Disclosure issue. Information disclosure is a very common issue that attackers will attempt to exploit as a first pass across the application. As they probe the application they will take note of anything that may seem out of place or any bit of information they can use to their advantage such as error messages, system information, user data, version numbers, component names, URL paths, or even simple typos and misspellings.
Max CVSS
3.3
EPSS Score
0.05%
Published
2017-12-13
Updated
2017-12-27
An Information Disclosure vulnerability exists in the mid.dat file stored on the SD card in Symantec Norton Mobile Security for Android before 3.16, which could let a local malicious user obtain sensitive information.
Max CVSS
5.5
EPSS Score
0.05%
Published
2020-01-08
Updated
2020-01-13
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 does not properly implement the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for unintended HTTP traffic on port 8445.
Max CVSS
5.3
EPSS Score
0.12%
Published
2016-06-30
Updated
2017-09-01
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to discover the PHP JSESSIONID value via unspecified vectors.
Max CVSS
8.0
EPSS Score
0.21%
Published
2016-06-30
Updated
2017-09-01
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to discover credentials via a brute-force attack.
Max CVSS
8.8
EPSS Score
0.24%
Published
2016-06-30
Updated
2017-09-01
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated administrators to enumerate administrator accounts via modified GET requests.
Max CVSS
4.3
EPSS Score
0.09%
Published
2016-06-30
Updated
2017-09-01
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to bypass the Authentication Lock protection mechanism, and conduct brute-force password-guessing attacks against management-console accounts, by entering data into the authorization window.
Max CVSS
8.8
EPSS Score
0.23%
Published
2016-06-30
Updated
2017-09-01
The LDAP service in Symantec Encryption Management Server (SEMS) 3.3.2 before MP12 allows remote attackers to obtain sensitive information about administrator accounts via a modified request.
Max CVSS
7.5
EPSS Score
0.11%
Published
2016-02-18
Updated
2016-12-06
EACommunicatorSrv.exe in the Framework Service in the client in Symantec Endpoint Encryption (SEE) before 11.1.0 allows remote authenticated users to discover credentials by triggering a memory dump.
Max CVSS
2.3
EPSS Score
0.10%
Published
2015-12-18
Updated
2015-12-18
The default configuration of SGOS in Blue Coat ProxySG before 6.2.16.5, 6.5 before 6.5.7.1, and 6.6 before 6.6.2.1 forwards authentication challenges from upstream origin content servers (OCS) when used in an explicit proxy deployment, which makes it easier for remote attackers to obtain sensitive information via a 407 (aka Proxy Authentication Required) HTTP status code, as demonstrated when using NTLM authentication.
Max CVSS
5.0
EPSS Score
0.14%
Published
2015-12-07
Updated
2019-02-12
An unspecified action handler in the management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to read arbitrary files via unknown vectors.
Max CVSS
4.0
EPSS Score
0.10%
Published
2015-08-01
Updated
2017-09-21
The ajaxswing webui in the management server in Symantec Critical System Protection (SCSP) 5.2.9 through MP6 and Symantec Data Center Security: Server Advanced (SDCS:SA) 6.0.x through 6.0 MP1 allows remote authenticated users to obtain sensitive server information via unspecified vectors.
Max CVSS
4.0
EPSS Score
0.16%
Published
2015-01-21
Updated
2021-08-04
The agent and task-agent components in Symantec Management Platform 7.0 and 7.1 before 7.1 SP2 Mp1.1v7 rollup, as used in certain Altiris products, use the same registry-entry encryption key across different customers' installations, which makes it easier for local users to obtain sensitive information about package-server access, or cause a denial of service, by leveraging knowledge of this key.
Max CVSS
4.6
EPSS Score
0.04%
Published
2013-10-10
Updated
2013-10-10
The NDMP protocol implementation in Symantec Backup Exec 2010 R3 before 2010 R3 SP3 and 2012 before SP2 allows remote authenticated users to obtain sensitive host-version information via unspecified vectors.
Max CVSS
2.7
EPSS Score
0.05%
Published
2013-08-05
Updated
2013-08-09
The management console (aka Java console) on the Symantec Security Information Manager (SSIM) appliance 4.7.x and 4.8.x before 4.8.1 allows remote attackers to obtain sensitive information via unspecified web-GUI API calls.
Max CVSS
2.9
EPSS Score
0.09%
Published
2013-07-08
Updated
2013-07-08
Symantec Messaging Gateway (SMG) before 10.0 allows remote attackers to obtain potentially sensitive information about component versions via unspecified vectors.
Max CVSS
3.3
EPSS Score
0.18%
Published
2012-08-29
Updated
2013-10-10
qioadmin in the Quick I/O for Database feature in Symantec Veritas File System (VxFS) on HP-UX, and before 5.0 MP3 on Solaris, Linux, and AIX, allows local users to read arbitrary files by causing qioadmin to write a file's content to standard error in an error message.
Max CVSS
4.6
EPSS Score
0.04%
Published
2008-10-21
Updated
2018-10-11
qiomkfile in the Quick I/O for Database feature in Symantec Veritas File System (VxFS) on HP-UX, and before 5.0 MP3 on Solaris, Linux, and AIX, does not initialize filesystem blocks during creation of a file, which allows local users to obtain sensitive information by creating and then reading files.
Max CVSS
4.6
EPSS Score
0.04%
Published
2008-10-21
Updated
2018-10-11
28 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!