Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
symantec norton antivirus vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2006-4927
The (a) NAVENG (NAVENG.SYS) and (b) NAVEX15 (NAVEX15.SYS) device drivers 20061.3.0.12 and later, as used in Symantec AntiVirus and security products, allow local users to gain privileges by overwriting critical system addresses using a crafted Irp to the IOCTL functions (1) 0x222...
Symantec Naveng Driver
Symantec Navex15 Driver
2 EDB exploits
9.3
CVSSv2
CVE-2008-0312
Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote mali...
Symantec Norton 360 1.0
Symantec Norton Antivirus 2006
Symantec Norton System Works 2007
Symantec Norton System Works 2008
Symantec Norton Internet Security 2006
Symantec Norton Internet Security 2007
Symantec Norton Internet Security 2008
Symantec Norton System Works 2006
Symantec Norton Antivirus 2007
Symantec Norton Antivirus 2008
5
CVSSv2
CVE-2002-0344
Symantec LiveUpdate 1.5 and previous versions in Norton Antivirus stores usernames and passwords for a local LiveUpdate server in cleartext in the registry, which may allow remote malicious users to impersonate the LiveUpdate server.
Symantec Liveupdate
5
CVSSv2
CVE-2001-1099
The default configuration of Norton AntiVirus for Microsoft Exchange 2000 2.x allows remote malicious users to identify the recipient's INBOX file path by sending an email with an attachment containing malicious content, which includes the path in the rejection notice.
Symantec Norton Antivirus 2.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8