Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
symantec norton antivirus 2004 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0487
A certain ActiveX control in Symantec Norton AntiVirus 2004 allows remote malicious users to cause a denial of service (resource consumption) and possibly execute arbitrary programs.
Symantec Norton Antivirus 2.1
NA
CVE-2004-0683
Symantec Norton AntiVirus 2002 and 2003 allows remote malicious users to cause a denial of service (CPU consumption) via a compressed archive that contains a large number of directories.
Symantec Norton Antivirus 2002
Symantec Norton Antivirus 2003
1 EDB exploit
NA
CVE-2004-0364
The WrapNISUM ActiveX component (WrapUM.dll) in Norton Internet Security 2004 is marked safe for scripting, which allows remote malicious users to execute arbitrary programs via the LaunchURL method.
Symantec Norton Internet Security 2004
NA
CVE-2003-0994
The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x up to and including 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0,...
Symantec Norton Antivirus 2001
Symantec Norton Antivirus 2002
Symantec Norton Internet Security 2002
Symantec Norton System Works 2003
Symantec Norton System Works 2004
Symantec Norton Antivirus 2003
Symantec Norton Internet Security 2003
Symantec Windows Liveupdate 1.70.x
Symantec Windows Liveupdate 1.90.x
Symantec Norton Antivirus 2.1
Symantec Norton Internet Security 2001
Symantec Norton System Works 2001
Symantec Norton System Works 2002
Symantec Norton Antivirus 2004
Symantec Norton Antivirus V3.0
Symantec Norton Internet Security 2004
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2