Page 2 of 11 results (0.006 seconds)

CVSS: 6.8EPSS: 0%CPEs: 18EXPL: 0

Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program. • http://secunia.com/advisories/19682 http://securityreason.com/securityalert/100 http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html http://securitytracker.com/id?1015953 http://www.securityfocus.com/archive/1/431318/100/0/threaded http://www.securityfocus.com/bid/17571 http://www.vupen.com/english/advisories/2006/1386 https://exchange.xforce.ibmcloud.com/vulnerabilities/25839 •

CVSS: 7.2EPSS: 0%CPEs: 23EXPL: 0

The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x through 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0, allows local users to gain SYSTEM privileges. La funcionalidad gui para una sesión interactiva en ymantec LiveUpdate 1.70.x hasta la 1.90.x (usadas en Norton Internet Security 2001 hasta 2004, SystemWorks 2001 hasta 2004, y AntiVirus y Norton AntiVirus Pro 2001 hasta 2004, AntiVirus for Handhelds v3.0) permite que usuarios locales obtengan privilegios SYSTEM. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html http://marc.info/?l=bugtraq&m=107393473928245&w=2 http://www.osvdb.org/3428 http://www.secnetops.biz/research/SRT2004-01-09-1022.txt •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Symantec LiveUpdate 1.5 and earlier in Norton Antivirus stores usernames and passwords for a local LiveUpdate server in cleartext in the registry, which may allow remote attackers to impersonate the LiveUpdate server. • http://marc.info/?l=bugtraq&m=101466781122312&w=2 http://marc.info/?l=bugtraq&m=101496301307285&w=2 http://www.iss.net/security_center/static/8282.php http://www.securityfocus.com/bid/4170 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Symantec LiveUpdate 1.4 through 1.6, and possibly later versions, allows remote attackers to cause a denial of service (flood) via DNS spoofing of the update.symantec.com site. • http://www.sarc.com/avcenter/security/Content/2001.10.05.html http://www.securityfocus.com/archive/1/218717 http://www.securityfocus.com/bid/3413 https://exchange.xforce.ibmcloud.com/vulnerabilities/7235 •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

Symantec LiveUpdate before 1.6 does not use cryptography to ensure the integrity of download files, which allows remote attackers to execute arbitrary code via DNS spoofing of the update.symantec.com site. • http://www.sarc.com/avcenter/security/Content/2001.10.05.html http://www.securityfocus.com/archive/1/218717 http://www.securityfocus.com/bid/3403 https://exchange.xforce.ibmcloud.com/vulnerabilities/7235 • CWE-494: Download of Code Without Integrity Check •