![]() , "cvelist":, "modified": "T00:00:00", "id": "1337DAY-ID-23949", "href": "", "sourceData": "Code White found several vulnerabilities in Symantec Endpoint Protection\r\n(SEP), affecting versions 12.1 prior to 12.1 RU6 MP1.\r\n\r\nSEP Manager (SEPM):\r\n\r\n* CVE-2015-1486: Authentication Bypass\r\n* CVE-2015-1487: Arbitrary File Write\r\n* CVE-2015-1488: Arbitrary File Read\r\n* CVE-2015-1489: Privilege Escalation\r\n* CVE-2015-1490: Path Traversal\r\n* CVE-2015-1491: SQL Injection\r\n\r\nSEP clients:\r\n\r\n* CVE-2015-1492: Binary Planting\r\n\r\nOfficial Symantec advisory SYM15-007:\r\n\r\n\r\n\r\n\r\nAn exploitation of these vulnerabilities effectively allow an unauthenticated remote attacker the full compromise of both the SEPM server as well as SEP clients running Windows. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |