Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
symantec norton antivirus 2004 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0487
A certain ActiveX control in Symantec Norton AntiVirus 2004 allows remote malicious users to cause a denial of service (resource consumption) and possibly execute arbitrary programs.
Symantec Norton Antivirus 2.1
NA
CVE-2004-0683
Symantec Norton AntiVirus 2002 and 2003 allows remote malicious users to cause a denial of service (CPU consumption) via a compressed archive that contains a large number of directories.
Symantec Norton Antivirus 2002
Symantec Norton Antivirus 2003
1 EDB exploit
NA
CVE-2004-0364
The WrapNISUM ActiveX component (WrapUM.dll) in Norton Internet Security 2004 is marked safe for scripting, which allows remote malicious users to execute arbitrary programs via the LaunchURL method.
Symantec Norton Internet Security 2004
NA
CVE-2003-0994
The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x up to and including 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0,...
Symantec Norton Antivirus 2001
Symantec Norton Antivirus 2002
Symantec Norton Internet Security 2002
Symantec Norton System Works 2003
Symantec Norton System Works 2004
Symantec Norton Antivirus 2003
Symantec Norton Internet Security 2003
Symantec Windows Liveupdate 1.70.x
Symantec Windows Liveupdate 1.90.x
Symantec Norton Antivirus 2.1
Symantec Norton Internet Security 2001
Symantec Norton System Works 2001
Symantec Norton System Works 2002
Symantec Norton Antivirus 2004
Symantec Norton Antivirus V3.0
Symantec Norton Internet Security 2004
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2