Norton Halt exploit defender 220.127.116.11 APK
- Version: 18.104.22.168
- File size: 8.54MB
- Requires: Android 2.3+
- Package Name: com.symantec.android.nfr
- Developer: NortonMobile
- Updated: January 22, 2018
- Price: Free
- Rate 4.22 stars – based on 2737 reviews
We provide Norton Halt exploit defender 22.214.171.124 APK file for Android 2.3+ and up.
Norton Halt exploit defender is a free Tools app.
It's easy to download and install to your mobile phone.
Please be aware that ApkPlz only share the original and free pure apk installer for Norton Halt exploit defender 126.96.36.199 APK without any modifications.
The average rating is 4.22 out of 5 stars on playstore. If you want to know more about Norton Halt exploit defender then you may visit NortonMobile support center for more information
All the apps & games here are for home or personal use only. If any apk download infringes your copyright, please contact us. Norton Halt exploit defender is the property and trademark from the developer NortonMobile.
• Detects the Zipfury Path Traversal Vulnerability and Keyring Vulnerability
• Detects the WifiHs20UtilityService vulnerability
• Checks your device for the Stagefright vulnerability (including Stagefright 2.0)
• Detects the Lock Screen Bypass vulnerability
• Detects the Serialization vulnerability
• Checks for browsers that are vulnerable to Same Origin Policy Security Bypass
• Scans for apps that use vulnerable versions of the Apache Cordova toolkit
• Lets you know whether your device has the Fake ID vulnerability
• Scans your phone to detect MasterKey vulnerability and the Obad Trojan virus
• Prevents multiple lock screen bypass exploits
• Detects Exynos 4 exploit and USSD code attacks
• Blocks unauthorized USSD code requests and stops the dialer from executing USSD codes
• Updated periodically to help protect against new threats and vulnerabilities
Keyring Vulnerability (CVE-2016-0728)
A malicious app can exploit this vulnerability to run arbitrary code as the system user, enabling it to potentially take control of the device.
Zipfury Path Traversal Vulnerability (CVE-2015-8780)
A malicious party can craft a special backup archive, which when restored to a vulnerable device, allows the malicious party to place files in arbitrary locations on the device, including privileged system locations.
WIFIHS20UTILITYSERVICE VULNERABILITY (CVE-2015-7888)
The WifiHs20UtilityService vulnerability allows attackers to write a controlled file to an arbitrary path as the system user on certain devices.
STAGEFRIGHT VULNERABILITY (CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, CVE-2015-3829, CVE-2015-3876, CVE-2015-6602, CVE-2015-3864)
A remotely exploitable software defect that affects the Android operating system, it allows an attacker to perform arbitrary operations on the victim device through remote code execution and privilege elevation.
LOCK SCREEN BYPASS VULNERABILITY (CVE-2015-3860)
The Lock Screen Bypass vulnerability allows anybody with physical access to the device to potentially unlock it without knowing the correct password.
SERIALIZATION VULNERABLITY (CVE-2015-3825)
The Serialization vulnerability allows attackers to execute arbitrary code with escalated privileges, enabling them to take over the device. This is due to a flawed OpenSSLX509Certificate implementation in the Android operating system.
ANDROID BROWSER SAME ORIGIN POLICY SECURITY BYPASS VULNERABILITY
Allows an attacker to bypass the same origin policy in the Android Open Source Project (AOSP) browser by convincing a user to visit a malicious website. Once the bug is exploited, the attacker could view any Web page open on the AOSP browser.
APACHE CORDOVA VULNERABILITY
Apache Cordova is a widely used development toolkit used to build apps. Many Android apps, especially banking apps, are open to attack due to a vulnerability in earlier versions of the Apache Cordova platform. This vulnerability can be used to remotely extract user’s information, including login credentials.
FAKE ID VULNERABILITY
Allows malicious apps to break out of a key security sandbox and gain access to parts of the Android OS that are usually out of bounds. These apps “fake” certain Android credentials to gain access and steal users’ personal information (passwords, financial information, etc.).
MASTER KEY EXPLOIT
Malware that hijacks installed apps and turns them into malicious Trojans that can access personal information. Infected devices can be used to steal user data or to create a mobile botnet.
LOCK SCREEN BYPASS EXPLOIT
Variations of this exploit allows attackers to gain access to your device by bypassing the PIN/password/pattern lock screen.