CVE-2006-4802
https://notcve.org/view.php?id=CVE-2006-4802
Format string vulnerability in the Real Time Virus Scan service in Symantec AntiVirus Corporate Edition 8.1 up to 10.0, and Client Security 1.x up to 3.0, allows local users to execute arbitrary code via an unspecified vector related to alert notification messages, a different vector than CVE-2006-3454, a "second format string vulnerability" as found by the vendor. Vulnerabilidad de formato de cadena en el servicio Real Time Virus Scan de Symantec AntiVirus Corporate Edition 8.1 a la 10.0, y Client Security 1.x a la 3.0, permite a un usuario local ejecutar código de su elección a través de un vector no espeficicado relacionado con los mensajes de notificación de alertas, un vector diferente a CVE-2006-3454, una "segunda vulnerabilidad de formato de cadena" según lo encontrado por el vendedor. • http://secunia.com/advisories/21884 http://securityresponse.symantec.com/avcenter/security/Content/2006.09.13.html http://securitytracker.com/id?1016842 http://www.securityfocus.com/archive/1/446293/100/0/threaded http://www.securityfocus.com/bid/19986 https://exchange.xforce.ibmcloud.com/vulnerabilities/28937 •
CVE-2006-3454
https://notcve.org/view.php?id=CVE-2006-3454
Multiple format string vulnerabilities in Symantec AntiVirus Corporate Edition 8.1 up to 10.0, and Client Security 1.x up to 3.0, allow local users to execute arbitrary code via format strings in (1) Tamper Protection and (2) Virus Alert Notification messages. Múltiples vulnerabilidades de cadenas de formato en Symantec AntiVirus Corporate Edition 8.1 hasta 10.0, y Client Security 1.x hasta 3.0, permiten a usuarios locales ejecutar código de su elección mediante cadenas de formato en (1) Protección de Alteración en el Cliente (Tamper Protection) y (2) Mensajes de Notificación de Alerta de Virus. • http://layereddefense.com/SAV13SEPT.html http://secunia.com/advisories/21884 http://securityresponse.symantec.com/avcenter/security/Content/2006.09.13.html http://securitytracker.com/id?1016842 http://www.securityfocus.com/archive/1/446041/100/0/threaded http://www.securityfocus.com/archive/1/446293/100/0/threaded http://www.securityfocus.com/bid/19986 http://www.vupen.com/english/advisories/2006/3599 https://exchange.xforce.ibmcloud.com/vulnerabilities/28936 •
CVE-2005-0249
https://notcve.org/view.php?id=CVE-2005-0249
Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header. • http://securitytracker.com/id?1013133 http://www.kb.cert.org/vuls/id/107822 http://www.symantec.com/avcenter/security/Content/2005.02.08.html http://xforce.iss.net/xforce/alerts/id/187 https://exchange.xforce.ibmcloud.com/vulnerabilities/18869 •
CVE-2004-0920
https://notcve.org/view.php?id=CVE-2004-0920
Symantec Norton AntiVirus 2004, and earlier versions, allows a virus or other malicious code to avoid detection or cause a denial of service (application crash) using a filename containing an MS-DOS device name. Symantec Norton Antivirus 2004 y versiones anteriores permiten a un virus u otro código malicioso evitar ser detectados o causar una denegación de servicio (caída de aplicación) usando un nombre de fichero que contenga un nombre de dispositivo de MS-DOS. • http://www.idefense.com/application/poi/display?id=147&type=vulnerabilities http://www.seifried.org/security/advisories/kssa-010.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17603 •
CVE-2000-0238
https://notcve.org/view.php?id=CVE-2000-0238
Buffer overflow in the web server for Norton AntiVirus for Internet Email Gateways allows remote attackers to cause a denial of service via a long URL. • http://www.securityfocus.com/bid/1064 http://www.securityfocus.com/templates/archive.pike?list=1&msg=s8d1f3e3.036%40kib.co.kodiak.ak.us •