Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
symantec endpoint protection vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2018-12238
Norton before 22.15; Symantec Endpoint Protection (SEP) before 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) before 22.15.1 may be suscep...
Symantec Endpoint Protection Cloud
Symantec Endpoint Protection
Symantec Norton Antivirus
6.8
CVSSv3
CVE-2018-12239
Norton before 22.15; Symantec Endpoint Protection (SEP) before 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) before 22.15.1 may be suscep...
Symantec Endpoint Protection Cloud
Symantec Endpoint Protection
Symantec Norton Antivirus
3.3
CVSSv3
CVE-2020-5830
Symantec Endpoint Protection Manager (SEPM), before 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
Symantec Endpoint Protection Manager 14.2
Symantec Endpoint Protection Manager
3.3
CVSSv3
CVE-2020-5831
Symantec Endpoint Protection Manager (SEPM), before 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
Symantec Endpoint Protection Manager 14.2
Symantec Endpoint Protection Manager
3.3
CVSSv3
CVE-2020-5827
Symantec Endpoint Protection Manager (SEPM), before 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
Symantec Endpoint Protection Manager 14.2
Symantec Endpoint Protection Manager
3.3
CVSSv3
CVE-2020-5829
Symantec Endpoint Protection Manager (SEPM), before 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
Symantec Endpoint Protection Manager 14.2
Symantec Endpoint Protection Manager
3.3
CVSSv3
CVE-2020-5828
Symantec Endpoint Protection Manager (SEPM), before 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
Symantec Endpoint Protection Manager 14.2
Symantec Endpoint Protection Manager
7.8
CVSSv3
CVE-2019-12759
Symantec Endpoint Protection Manager (SEPM) and Symantec Mail Security for MS Exchange (SMSMSE), prior to versions 14.2 RU2 and 7.5.x respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise t...
Symantec Endpoint Protection Manager 14.2
Symantec Endpoint Protection Manager
Symantec Mail Security
7.8
CVSSv3
CVE-2020-5836
Symantec Endpoint Protection, before 14.3, can potentially reset the ACLs on a file as a limited user while Symantec Endpoint Protection's Tamper Protection feature is disabled.
Symantec Endpoint Protection
7.8
CVSSv3
CVE-2017-13681
Symantec Endpoint Protection prior to SEP 12.1 RU6 MP9 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels. In the circumstances of this i...
Symantec Endpoint Protection
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »