The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Norton Antivirus Plus

Antivirus: privilege escalation via Microsoft Application Verifier
An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges...
1116957, CVE-2017-5565, CVE-2017-5566, CVE-2017-5567, CVE-2017-6186, CVE-2017-6417, VIGILANCE-VUL-22211
Norton: code execution via the "Download Manager"
An attacker can use a vulnerability via Download Manager of Norton, in order to run code...
CVE-2016-6592, SYM17-001, VIGILANCE-VUL-21619
Norton, Symantec Endpoint Protection: privilege escalation via DLL Pre-loading
An attacker can bypass restrictions via DLL Pre-loading of Norton or Symantec Endpoint Protection, in order to escalate his privileges...
CVE-2016-5311, SYM16-021, VIGILANCE-VUL-21156
Symantec: seven vulnerabilities of the "Decomposer" module
An attacker can use several vulnerabilities of Symantec products...
810, 814, 816, 818, 819, 821, 823, CERTFR-2016-AVI-222, CVE-2016-2207, CVE-2016-2209, CVE-2016-2210, CVE-2016-2211, CVE-2016-3644, CVE-2016-3645, CVE-2016-3646, VIGILANCE-VUL-19997
Symantec AVE: memory corruption via PE Header
An attacker can generate a memory corruption via a PE Header on Symantec AVE, in order to trigger a denial of service, and possibly to run code with system privileges...
820, BID-90653, CVE-2016-2208, SYM16-008, VIGILANCE-VUL-19636
Symantec Antivirus: bypassing via CAB, CHM, ELF, EXE, Office, RAR, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by Symantec Antivirus...
BID-52575, BID-52580, BID-52600, BID-52608, BID-52610, BID-52612, BID-52613, BID-52623, BID-52626, CVE-2012-1421, CVE-2012-1425, CVE-2012-1443, CVE-2012-1446, CVE-2012-1456, CVE-2012-1457, CVE-2012-1459, CVE-2012-1461, CVE-2012-1462, VIGILANCE-VUL-11472
Antivirus: bypassing SSDT Hooking
When an antivirus redirects the SSDT to detect viruses, a local attacker can use an atomicity error, in order to bypass this protection...
CVE-2010-5151, CVE-2010-5152, CVE-2010-5154, CVE-2010-5156, CVE-2010-5161, CVE-2010-5163, CVE-2010-5166, CVE-2010-5167, CVE-2010-5168, CVE-2010-5171, CVE-2010-5172, CVE-2010-5177, CVE-2010-5179, VIGILANCE-VUL-9633
Symantec AV, Norton AV: several vulnerabilities
Three vulnerabilities of Symantec and Norton products can be used by an attacker to disable the antivirus or to execute code...
BID-38127, BID-38129, BID-38222, CERTA-2010-AVI-087, CVE-2010-0106, CVE-2010-0107, CVE-2010-0108, DSECRG-09-039, SYM10-002, SYM10-003, SYM10-004, VIGILANCE-VUL-9462
F-Secure, McAfee, Symantec: bypassing via PDF
An attacker can create a malicious PDF document which is not detected by F-Secure, McAfee and Symantec products...
BID-36848, BID-36876, CERTA-2009-AVI-172, CVE-2009-1348, FSC-2009-3, G-SEC 47-2009, G-SEC 48-2009, G-SEC 49-2009, SB10003, VIGILANCE-VUL-9133
Symantec, Norton AV: denial of service
An attacker can send a malicious email, in order to prevent the victim from reading his other emails...
BID-34670, CVE-2009-3104, SYM09-012, VIGILANCE-VUL-8982
Our database contains other pages. You can request a free trial to read them.

Display information about Norton Antivirus Plus: