Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 30 Jan 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom symantec Endpoint Protection Symantec Symantec endpoint Protection |
|
| Vendors & Products |
Broadcom
Broadcom symantec Endpoint Protection Symantec Symantec endpoint Protection |
Wed, 28 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry. | |
| Title | Component Object Model (COM) Hijacking in Symantec Endpoint Protection Windows Client | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: symantec
Published:
Updated: 2026-01-30T07:15:39.833Z
Reserved: 2025-12-02T18:57:26.118Z
Link: CVE-2025-13919
Updated: 2026-01-28T18:50:11.401Z
Status : Awaiting Analysis
Published: 2026-01-28T17:16:06.493
Modified: 2026-01-30T08:16:01.177
Link: CVE-2025-13919
No data.
OpenCVE Enrichment
Updated: 2026-01-29T09:09:22Z