{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T05:05:42.231","vulnerabilities":[{"cve":{"id":"CVE-2017-15530","sourceIdentifier":"secure@symantec.com","published":"2017-12-13T19:29:00.283","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Prior to 4.4.1.10, the Norton Family Android App can be susceptible to an Information Disclosure issue. Information disclosure is a very common issue that attackers will attempt to exploit as a first pass across the application. As they probe the application they will take note of anything that may seem out of place or any bit of information they can use to their advantage such as error messages, system information, user data, version numbers, component names, URL paths, or even simple typos and misspellings."},{"lang":"es","value":"Antes de la versión 4.4.1.10, Norton Family Android App puede ser susceptible a un problema de filtrado de información. El filtrado de información es un problema muy común que los atacantes intentarán explotar como un primer paso en la aplicación. Mientras sondean la aplicación, tomarán nota de cualquier cosa que parezca estar fuera de lugar o de cualquier tipo de información que pueden utilizar a su favor, como los mensajes de error, información del sistema, datos de usuario, números de versión, nombres de componentes, rutas de URL o, incluso, simples erratas y faltas de ortografía."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:norton_family:*:*:*:*:*:android:*:*","versionEndExcluding":"4.4.1.10","matchCriteriaId":"11181A75-E828-474B-9315-0A5F16D13A38"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/102120","source":"secure@symantec.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171213_00","source":"secure@symantec.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/102120","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171213_00","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}