Show filters
599 Total Results
Displaying 91-100 of 599
Sort by:
Attacker Value
Unknown
CVE-2018-5238
Disclosure Date: August 22, 2018 (last updated November 27, 2024)
Norton Power Eraser (prior to 5.3.0.24) and SymDiag (prior to 2.1.242) may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for execution and an attacker provides a malicious DLL to use instead. Depending on how the application is configured, it will generally follow a specific search path to locate the DLL. The vulnerability can be exploited by a simple file write (or potentially an over-write) which results in a foreign DLL running under the context of the application.
0
Attacker Value
Unknown
CVE-2018-5243
Disclosure Date: August 20, 2018 (last updated November 27, 2024)
The Symantec Encryption Management Server (SEMS) product, prior to version 3.4.2 MP1, may be susceptible to a denial of service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network.
0
Attacker Value
Unknown
CVE-2018-5240
Disclosure Date: July 25, 2018 (last updated November 27, 2024)
The Inventory Plugin for Symantec Management Agent prior to 7.6 POST HF7, 8.0 POST HF6, or 8.1 RU7 may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
0
Attacker Value
Unknown
CVE-2018-5239
Disclosure Date: July 16, 2018 (last updated November 27, 2024)
Norton App Lock prior to v1.3.0.332 can be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent it from locking the device, thereby allowing the individual to gain device access.
0
Attacker Value
Unknown
CVE-2018-5237
Disclosure Date: June 20, 2018 (last updated November 26, 2024)
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
0
Attacker Value
Unknown
CVE-2018-5236
Disclosure Date: June 20, 2018 (last updated November 26, 2024)
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 may be susceptible to a race condition (or race hazard). This type of issue occurs in software where the output is dependent on the sequence or timing of other uncontrollable events.
0
Attacker Value
Unknown
CVE-2018-5242
Disclosure Date: June 13, 2018 (last updated November 26, 2024)
Norton App Lock prior to version 1.3.0.329 can be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent it from locking the device, thereby allowing the individual to gain device access.
0
Attacker Value
Unknown
CVE-2018-5234
Disclosure Date: April 30, 2018 (last updated November 26, 2024)
The Norton Core router prior to v237 may be susceptible to a command injection exploit. This is a type of attack in which the goal is execution of arbitrary commands on the host system via vulnerable software.
0
Attacker Value
Unknown
CVE-2017-6323
Disclosure Date: April 16, 2018 (last updated November 26, 2024)
The Symantec Management Console prior to ITMS 8.1 RU1, ITMS 8.0_POST_HF6, and ITMS 7.6_POST_HF7 has an issue whereby XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts.
0
Attacker Value
Unknown
CVE-2016-9094
Disclosure Date: April 16, 2018 (last updated November 26, 2024)
Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on the intended target client.
0