Symantec AntiVirus Scan Engine Multiple Remote Vulnerabilities

To exploit these vulnerabilities, attackers require specific knowledge, but they would likely use pre-existing network utilities, encryption software, and web clients to conduct attacks.

Exploit code demonstrating the authentication-bypass vulnerability is available:


 

Privacy Statement
Copyright 2010, SecurityFocus