3 results (0.006 seconds)

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

Norton Utilities (prior to 16.0.3.44) may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for execution and an attacker provides a malicious DLL to use instead. Depending on how the application is configured, it will generally follow a specific search path to locate the DLL. The vulnerability can be exploited by a simple file write (or potentially an over-write) which results in a foreign DLL running under the context of the application. Norton Utilities (en versiones anteriores a la 16.0.3.44) puede ser susceptible a una vulnerabilidad de precarga de DLL, que es un tipo de problema que puede ocurrir cuando una aplicación busca llamar a un DLL para su ejecución y un atacante proporciona un DLL malicioso para usarlo en su lugar. Dependiendo de cómo esté configurada la aplicación, ésta por lo general seguirá una ruta de búsqueda específica para localizar el DLL. • http://www.securityfocus.com/bid/105099 https://support.symantec.com/en_US/article.SYMSA1459.html • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.8EPSS: 0%CPEs: 18EXPL: 0

Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program. • http://secunia.com/advisories/19682 http://securityreason.com/securityalert/100 http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html http://securitytracker.com/id?1015953 http://www.securityfocus.com/archive/1/431318/100/0/threaded http://www.securityfocus.com/bid/17571 http://www.vupen.com/english/advisories/2006/1386 https://exchange.xforce.ibmcloud.com/vulnerabilities/25839 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

Symantec Norton Utilities 2.0 for Windows 95 marks the TUNEOCX.OCX ActiveX control as safe for scripting, which allows remote attackers to execute arbitrary commands via the run option through malicious web pages that are accessed by browsers such as Internet Explorer 3.0. • http://mlarchive.ima.com/win95/1997/May/0342.html http://news.zdnet.co.uk/story/0%2C%2Cs2065518%2C00.html http://www.iss.net/security_center/static/7188.php http://www.net-security.sk/bugs/NT/nu20.html •