Vulnerabilities

A Vulnerability is a state in a computing system (or set of systems) which either (a) allows an attacker to execute commands as another user, (b) allows an attacker to access data that is contrary to the specified access restrictions for that data, (c) allows an attacker to pose as another entity, or (d) allows an attacker to conduct a denial of service.

Advisories relating to Symantec products may be viewed here.

  1. Type: Vulnerability. WebKit is prone to an arbitrary-code execution vulnerability; fixes are available.
  2. Type: Vulnerability. Broadcom CA Nolio is prone to a remote code-execution vulnerability; fixes are available.
  3. Type: Vulnerability. Apple iOS and iPadOS are prone to a security bypass vulnerability; fixes are available.
  4. Type: Vulnerability. Apple iOS and iPadOS are prone to an arbitrary code execution vulnerability; fixes are available.
  5. Type: Vulnerability. Apple Xcode is prone to an arbitrary code-execution vulnerability; fixes are available.
  6. Type: Vulnerability. Apple macOS is prone to multiple security vulnerabilities; fixes are available.
  7. Type: Vulnerability. Apple watchOS, iOS, iPadOS, tvOS and Safari are prone to multiple memory corruption vulnerabilities; fixes are available.
  8. Type: Vulnerability. Symantec Messaging Gateway is prone to a cross-site scripting vulnerability; fixes are available.
  9. Type: Vulnerability. Symantec Messaging Gateway is prone to a privilege-escalation vulnerability; fixes are available.
  10. Type: Vulnerability. Symantec Messaging Gateway is prone to a security-bypass vulnerability; fixes are available.