Page 3 of 15 results (0.007 seconds)

CVSS: 2.6EPSS: 5%CPEs: 5EXPL: 0

Unspecified vulnerability in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to obtain sensitive information via unspecified vectors. Vulnerabilidad no especificada en el Control de ActiveX usado en Symantec Automated Support Assistant, como el usado en el AntiVirus Norton, en Internet Security y System Works 2005 y 2006, permite a los atacantes remotos, con la complicidad del usuario, obtener información sensible mediante vectores no especificados. • http://secunia.com/advisories/22228 http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html http://securitytracker.com/id?1016988 http://securitytracker.com/id?1016989 http://securitytracker.com/id?1016990 http://securitytracker.com/id?1016991 http://www.securityfocus.com/bid/20348 http://www.vupen.com/english/advisories/2006/3929 https://exchange.xforce.ibmcloud.com/vulnerabilities/29366 •

CVSS: 4.9EPSS: 0%CPEs: 101EXPL: 2

The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data. El driver \Device\SymEvent en Symantec Norton Personal Firewall 2006 9.1.0.33, y otras versiones del Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, y 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0 y 10.1, Symantec pcAnywhere 11.5 y Symantec Host, permite a usuarios locales provocar una denegación de servicio (caída del sistema) vía una información inválida, como ha sido demostrado llamando a DeviceIoControl para enviar la información. • https://www.exploit-db.com/exploits/28588 http://secunia.com/advisories/21938 http://securityreason.com/securityalert/1591 http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html http://securitytracker.com/id?1016889 http://securitytracker.com/id?1016892 http://securitytracker.com/id?1016893 http://securitytracker.com/id?1016894 http://securitytracker.com/id? • CWE-399: Resource Management Errors •

CVSS: 2.6EPSS: 0%CPEs: 8EXPL: 0

Multiple Symantec AntiVirus products, including Norton AntiVirus 2005 11.0.0, Web Security Web Security 3.0.1.72, Mail Security for SMTP 4.0.5.66, AntiVirus Scan Engine 4.3.7.27, SAV/Filter for Domino NT 3.1.1.87, and Mail Security for Exchange 4.5.4.743, when running on Windows, allows remote attackers to cause a denial of service (component crash) and avoid detection via a crafted RAR file. • http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Unknown vulnerability in the Auto-Protect module in Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (system hang or crash) by triggering a scan of a certain file type. • http://secunia.com/advisories/14741 http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html http://securitytracker.com/id?1013585 http://securitytracker.com/id?1013586 http://securitytracker.com/id?1013587 http://www.kb.cert.org/vuls/id/146020 http://www.securityfocus.com/bid/12923 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share. • http://secunia.com/advisories/14741 http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html http://securitytracker.com/id?1013585 http://securitytracker.com/id?1013586 http://securitytracker.com/id?1013587 http://www.kb.cert.org/vuls/id/713620 http://www.securityfocus.com/bid/12924 •