The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Norton Internet Security

Antivirus: privilege escalation via Microsoft Application Verifier
An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges...
1116957, CVE-2017-5565, CVE-2017-5566, CVE-2017-5567, CVE-2017-6186, CVE-2017-6417, VIGILANCE-VUL-22211
Norton: code execution via the "Download Manager"
An attacker can use a vulnerability via Download Manager of Norton, in order to run code...
CVE-2016-6592, SYM17-001, VIGILANCE-VUL-21619
Norton, Symantec Endpoint Protection: privilege escalation via DLL Pre-loading
An attacker can bypass restrictions via DLL Pre-loading of Norton or Symantec Endpoint Protection, in order to escalate his privileges...
CVE-2016-5311, SYM16-021, VIGILANCE-VUL-21156
Symantec: seven vulnerabilities of the "Decomposer" module
An attacker can use several vulnerabilities of Symantec products...
810, 814, 816, 818, 819, 821, 823, CERTFR-2016-AVI-222, CVE-2016-2207, CVE-2016-2209, CVE-2016-2210, CVE-2016-2211, CVE-2016-3644, CVE-2016-3645, CVE-2016-3646, VIGILANCE-VUL-19997
Symantec AVE: memory corruption via PE Header
An attacker can generate a memory corruption via a PE Header on Symantec AVE, in order to trigger a denial of service, and possibly to run code with system privileges...
820, BID-90653, CVE-2016-2208, SYM16-008, VIGILANCE-VUL-19636
Antivirus: bypassing SSDT Hooking
When an antivirus redirects the SSDT to detect viruses, a local attacker can use an atomicity error, in order to bypass this protection...
CVE-2010-5151, CVE-2010-5152, CVE-2010-5154, CVE-2010-5156, CVE-2010-5161, CVE-2010-5163, CVE-2010-5166, CVE-2010-5167, CVE-2010-5168, CVE-2010-5171, CVE-2010-5172, CVE-2010-5177, CVE-2010-5179, VIGILANCE-VUL-9633
Symantec AV, Norton AV: several vulnerabilities
Three vulnerabilities of Symantec and Norton products can be used by an attacker to disable the antivirus or to execute code...
BID-38127, BID-38129, BID-38222, CERTA-2010-AVI-087, CVE-2010-0106, CVE-2010-0107, CVE-2010-0108, DSECRG-09-039, SYM10-002, SYM10-003, SYM10-004, VIGILANCE-VUL-9462
F-Secure, McAfee, Symantec: bypassing via PDF
An attacker can create a malicious PDF document which is not detected by F-Secure, McAfee and Symantec products...
BID-36848, BID-36876, CERTA-2009-AVI-172, CVE-2009-1348, FSC-2009-3, G-SEC 47-2009, G-SEC 48-2009, G-SEC 49-2009, SB10003, VIGILANCE-VUL-9133
Symantec, Norton AV: denial of service
An attacker can send a malicious email, in order to prevent the victim from reading his other emails...
BID-34670, CVE-2009-3104, SYM09-012, VIGILANCE-VUL-8982
Symantec Antivirus: bypassing via RAR TAR ZIP
An attacker can create a RAR/TAR/ZIP archive containing a virus which is not detected by Symantec...
BID-35354, SYM09-009, VIGILANCE-VUL-8797
Our database contains other pages. You can request a free trial to read them.

Display information about Norton Internet Security: