Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
symantec ghost solutions suite 1.0 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2015-5689
ghostexp.exe in Ghost Explorer Utility in Symantec Ghost Solutions Suite (GSS) prior to 3.0 HF2 12.0.0.8010 and Symantec Deployment Solution (DS) prior to 7.6 HF4 12.0.0.7045 performs improper sign-extend operations before array-element accesses, which allows remote malicious use...
Symantec Ghost Solutions Suite 1.0
Symantec Ghost Solutions Suite 1.1
Symantec Ghost Solutions Suite 2.0.1
Symantec Ghost Solutions Suite 2.0
Symantec Ghost Solutions Suite 2.1
Symantec Ghost Solutions Suite 2.0.2
Symantec Deployment Solution 6.9
4.6
CVSSv2
CVE-2006-1284
The installation of SQLAnywhere in Symantec Ghost 8.0 and 8.2, as used in Symantec Ghost Solutions Suite (SGSS) 1.0, includes a default administrator login account and password, which allows local users to gain privileges or modify tasks.
Symantec Ghost Solutions Suite 1.0
Symantec Norton Ghost 8.0
Symantec Norton Ghost 8.2
3.2
CVSSv2
CVE-2006-1285
SQLAnywhere in Symantec Ghost 8.0 and 8.2, as used in Symantec Ghost Solutions Suite (SGSS) 1.0, gives read and write permissions to all users for database shared memory sections, which allows local users to access and possibly modify certain information.
Symantec Ghost Solutions Suite 1.0
Symantec Norton Ghost 8.0
Symantec Norton Ghost 8.2
2.1
CVSSv2
CVE-2006-1286
Buffer overflow in the login dialog in dbisqlc.exe in SQLAnywhere for Symantec Ghost 8.0 and 8.2, as used in Symantec Ghost Solutions Suite (SGSS) 1.0, might allow local users to read certain sensitive information from the database.
Symantec Ghost Solutions Suite 1.0
Symantec Norton Ghost 8.0
Symantec Norton Ghost 8.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started