Show filters
599 Total Results
Displaying 101-110 of 599
Sort by:
Attacker Value
Unknown
CVE-2016-9093
Disclosure Date: April 16, 2018 (last updated November 26, 2024)
A version of the SymEvent Driver that shipped with Symantec Endpoint Protection 12.1 RU6 MP6 and earlier fails to properly sanitize logged-in user input. SEP 14.0 and later are not impacted by this issue. A non-admin user would need to be able to save an executable file to disk and then be able to successfully run that file. If properly constructed, the file could access the driver interface and potentially manipulate certain system calls. On all 32-bit systems and in most cases on 64-bit systems, this will result in a denial of service that will crash the system. In very narrow circumstances, and on 64-bit systems only, this could allow the user to run arbitrary code on the local machine with kernel-level privileges. This could result in a non-privileged user gaining privileged access on the local machine.
0
Attacker Value
Unknown
CVE-2017-15534
Disclosure Date: March 26, 2018 (last updated November 26, 2024)
The Norton App Lock prior to version 1.3.0.13 can be susceptible to an authentication bypass exploit. In this type of circumstance, the exploit can allow the user to kill the app to prevent it from locking the device, thereby allowing the individual to gain device access.
0
Attacker Value
Unknown
CVE-2010-0109
Disclosure Date: February 19, 2018 (last updated November 26, 2024)
DBManager in Symantec Altiris Deployment Solution 6.9.x before DS 6.9 SP4 allows remote attackers to cause a denial of service via a crafted request.
0
Attacker Value
Unknown
CVE-2011-3477
Disclosure Date: February 19, 2018 (last updated November 26, 2024)
GEAR Software CD DVD Filter driver (aka GEARAspiWDM.sys), as used in Symantec Backup Exec System Recovery 8.5 and BESR 2010, Symantec System Recovery 2011, Norton 360, and Norton Ghost, allows local users to cause a denial of service (system crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2017-15531
Disclosure Date: January 23, 2018 (last updated November 26, 2024)
Symantec Reporter 9.5 prior to 9.5.4.1 and 10.1 prior to 10.1.5.5 does not restrict excessive authentication attempts for management interface users. A remote attacker can use brute force search to guess a user password and gain access to Reporter.
0
Attacker Value
Unknown
CVE-2017-15532
Disclosure Date: December 20, 2017 (last updated November 26, 2024)
Prior to 10.6.4, Symantec Messaging Gateway may be susceptible to a path traversal attack (also known as directory traversal). These types of attacks aim to access files and directories that are stored outside the web root folder. By manipulating variables, it may be possible to access arbitrary files and directories stored on the file system including application source code or configuration and critical system files.
0
Attacker Value
Unknown
CVE-2017-15529
Disclosure Date: December 13, 2017 (last updated November 26, 2024)
Prior to 4.4.1.10, the Norton Family Android App can be susceptible to a Denial of Service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular device unavailable to its intended user by temporarily or indefinitely disrupting services of a specific host within a network.
0
Attacker Value
Unknown
CVE-2017-15530
Disclosure Date: December 13, 2017 (last updated November 26, 2024)
Prior to 4.4.1.10, the Norton Family Android App can be susceptible to an Information Disclosure issue. Information disclosure is a very common issue that attackers will attempt to exploit as a first pass across the application. As they probe the application they will take note of anything that may seem out of place or any bit of information they can use to their advantage such as error messages, system information, user data, version numbers, component names, URL paths, or even simple typos and misspellings.
0
Attacker Value
Unknown
CVE-2017-15527
Disclosure Date: November 20, 2017 (last updated November 26, 2024)
Prior to ITMS 8.1 RU4, the Symantec Management Console can be susceptible to a directory traversal exploit, which is a type of attack that can occur when there is insufficient security validation / sanitization of user-supplied input file names, such that characters representing "traverse to parent directory" are passed through to the file APIs.
0
Attacker Value
Unknown
CVE-2017-15525
Disclosure Date: November 13, 2017 (last updated November 26, 2024)
Prior to SEE v11.1.3MP1, Symantec Endpoint Encryption can be susceptible to a denial of service (DoS) attack, which is a type of attack whereby the perpetrator attempts to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network.
0