Page 21 of 598 results (0.009 seconds)

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

Prior to 4.4.1.10, the Norton Family Android App can be susceptible to an Information Disclosure issue. Information disclosure is a very common issue that attackers will attempt to exploit as a first pass across the application. As they probe the application they will take note of anything that may seem out of place or any bit of information they can use to their advantage such as error messages, system information, user data, version numbers, component names, URL paths, or even simple typos and misspellings. Antes de la versión 4.4.1.10, Norton Family Android App puede ser susceptible a un problema de filtrado de información. El filtrado de información es un problema muy común que los atacantes intentarán explotar como un primer paso en la aplicación. • http://www.securityfocus.com/bid/102120 https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171213_00 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

Prior to 4.4.1.10, the Norton Family Android App can be susceptible to a Denial of Service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular device unavailable to its intended user by temporarily or indefinitely disrupting services of a specific host within a network. Antes de la versión 4.4.1.10, Norton Family Android App puede ser susceptible a un exploit de Denegación de servicio (DoS). Durante un ataque DoS, el infractor intenta hacer que un dispositivo en concreto se vuelva inutilizable para su usuario planeado mediante la interrupción temporal o indefinida de un host específico en una red. • http://www.securityfocus.com/bid/102119 https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171213_00 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Prior to ITMS 8.1 RU4, the Symantec Management Console can be susceptible to a directory traversal exploit, which is a type of attack that can occur when there is insufficient security validation / sanitization of user-supplied input file names, such that characters representing "traverse to parent directory" are passed through to the file APIs. En versiones anteriores a ITMS 8.1 RU4, Symantec Management Console puede ser susceptible a un exploit de salto de directorio, que es un tipo de ataque que puede ocurrir cuando hay una validación de seguridad o inmunización insuficiente de entradas de nombres de archivo proporcionadas por el usuario, de manera que los caracteres que representan "salto al directorio primario" se pasan a las API de archivos. • http://www.securityfocus.com/bid/101743 https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171120_00 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Prior to SEE v11.1.3MP1, Symantec Endpoint Encryption can be susceptible to a denial of service (DoS) attack, which is a type of attack whereby the perpetrator attempts to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network. Symantec Endpoint Encryption, en versiones anteriores a SEE v11.1.3MP1, puede ser susceptible a un ataque de denegación de servicio (DoS), que es un tipo de ataque en el que el perpetrador intenta hacer que un recurso de red o de máquina en particular deje de estar disponible para los usuarios que deberían tener acceso a dicho recurso interrumpiendo servicios de un host específico en una red de manera temporal o indefinida. • http://www.securityfocus.com/bid/101697 https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Prior to SEE v11.1.3MP1, Symantec Endpoint Encryption can be susceptible to a null pointer de-reference issue, which can result in a NullPointerException that can lead to a privilege escalation scenario. Symantec Endpoint Encryption, en versiones anteriores a SEE v11.1.3MP1, puede ser susceptible a un problema de desreferencia de puntero null, que puede resultar en una NullPointerException que conduzca a un escenario de escalado de privilegios. • http://www.securityfocus.com/bid/101698 https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00 • CWE-476: NULL Pointer Dereference •