Show filters
146 Total Results
Displaying 141-146 of 146
Sort by:
Attacker Value
Unknown

CVE-2007-2864

Disclosure Date: June 06, 2007 (last updated October 04, 2023)
Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.
0
Attacker Value
Unknown

CVE-2007-2896

Disclosure Date: May 30, 2007 (last updated October 04, 2023)
Race condition in the Symantec Enterprise Security Manager (ESM) 6.5.3 managers and agents on Windows before 20070524 allows remote attackers to cause a denial of service (CPU consumption and application hang) via certain network scans to ESM ports.
0
Attacker Value
Unknown

CVE-2007-2375

Disclosure Date: April 30, 2007 (last updated October 04, 2023)
The agent remote upgrade interface in Symantec Enterprise Security Manager (ESM) before 20070405 does not verify the authenticity of upgrades, which allows remote attackers to execute arbitrary code via software that implements the agent upgrade protocol.
0
Attacker Value
Unknown

CVE-2006-6641

Disclosure Date: December 20, 2006 (last updated October 04, 2023)
Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.
0
Attacker Value
Unknown

CVE-2006-4314

Disclosure Date: August 23, 2006 (last updated October 04, 2023)
The manager server in Symantec Enterprise Security Manager (ESM) 6 and 6.5.x allows remote attackers to cause a denial of service (hang) via a malformed ESM agent request.
0
Attacker Value
Unknown

CVE-2005-0356

Disclosure Date: May 31, 2005 (last updated February 22, 2025)
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
0