SHARE
Facebook X Pinterest WhatsApp

Flaws Found in Two Symantec Apps

Vulnerabilities weaken two of Symantec Corp.’s more popular security applications, Norton AntiSpam and Norton Internet Security, researchers have found. Both flaws enable attackers to run code on remote machines. The two weaknesses, one in each product, are similar in that they both involve ActiveX controls. The vulnerability in Norton Internet Security and Norton Internet Security […]

Written By
thumbnail Dennis Fisher
Dennis Fisher
Mar 19, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Vulnerabilities weaken two of Symantec Corp.’s more popular security applications, Norton AntiSpam and Norton Internet Security, researchers have found.

Both flaws enable attackers to run code on remote machines.

The two weaknesses, one in each product, are similar in that they both involve ActiveX controls. The vulnerability in Norton Internet Security and Norton Internet Security Professional affects an ActiveX component called WrapNISUM Class, which is marked safe for scripting.

Symantec, based in Cupertino, Calif., has produced fixes for both of the problems, which are available via its LiveUpdate service.

Click here for the full story.

Recommended for you...

Scale Computing Makes Strategic Updates to HyperCore Solution
Jordan Smith
Sep 17, 2025
Druva Launches Metadata Graphing & New Agentic AI Solutions
Jordan Smith
Sep 17, 2025
SonicWall’s Michael Crean on State of Managed Security
Victoria Durgin
Sep 17, 2025
Gigamon Unveils Agentic AI App to Boost IT Productivity
Luis Millares
Sep 16, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.