Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
symantec endpoint encryption vulnerabilities and exploits
(subscribe to this query)
392
VMScore
CVE-2016-6590
A privilege escalation vulnerability exists when loading DLLs during boot up and reboot in Symantec IT Management Suite 8.0 before 8.0 HF4 and Suite 7.6 before 7.6 HF7, Symantec Ghost Solution Suite 3.1 before 3.1 MP4, Symantec Endpoint Virtualization 7.x before 7.6 HF7, and Syma...
Symantec It Management Suite 8.0
Symantec It Management Suite 7.6
Symantec Ghost Solution Suite 3.1
Symantec Endpoint Encryption
Symantec Endpoint Encryption 7.6
Symantec Encryption Desktop
409
VMScore
CVE-2019-9702
Symantec Endpoint Encryption, prior to SEE 11.3.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
Symantec Endpoint Encryption
409
VMScore
CVE-2019-9703
Symantec Endpoint Encryption, prior to SEE 11.3.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
Symantec Endpoint Encryption
409
VMScore
CVE-2019-9694
Symantec Endpoint Encryption prior to SEE 11.2.1 MP1 may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from a...
Symantec Endpoint Encryption 11.0
Symantec Endpoint Encryption 11.1.1
Symantec Endpoint Encryption 11.1.2
Symantec Endpoint Encryption 11.1.3
Symantec Endpoint Encryption 11.1
Symantec Endpoint Encryption 11.2
490
VMScore
CVE-2017-15525
Prior to SEE v11.1.3MP1, Symantec Endpoint Encryption can be susceptible to a denial of service (DoS) attack, which is a type of attack whereby the perpetrator attempts to make a particular machine or network resource unavailable to its intended users by temporarily or indefinite...
Symantec Endpoint Encryption
463
VMScore
CVE-2017-15526
Prior to SEE v11.1.3MP1, Symantec Endpoint Encryption can be susceptible to a null pointer de-reference issue, which can result in a NullPointerException that can lead to a privilege escalation scenario.
Symantec Endpoint Encryption
205
VMScore
CVE-2017-13683
In Symantec Endpoint Encryption before SEE 11.1.3HF3, a kernel memory leak is a type of resource leak that can occur when a computer program incorrectly manages memory allocations in such a way that memory which is no longer needed is not released. In object-oriented programming,...
Symantec Endpoint Encryption 11.0.0
Symantec Endpoint Encryption 11.1.0
Symantec Endpoint Encryption 11.1.1
Symantec Endpoint Encryption 11.1.2
205
VMScore
CVE-2017-13675
A denial of service (DoS) attack in Symantec Endpoint Encryption before SEE 11.1.3HF2 allows remote malicious users to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a ne...
Symantec Endpoint Encryption
641
VMScore
CVE-2015-8156
Unquoted Windows search path vulnerability in EEDService in Symantec Endpoint Encryption (SEE) 11.x prior to 11.1.1 allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe.
Symantec Endpoint Encryption 11.0.0
Symantec Endpoint Encryption 11.0.1
Symantec Endpoint Encryption 11.0
205
VMScore
CVE-2015-6556
EACommunicatorSrv.exe in the Framework Service in the client in Symantec Endpoint Encryption (SEE) prior to 11.1.0 allows remote authenticated users to discover credentials by triggering a memory dump.
Symantec Endpoint Encryption
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started