2 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 4

The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL. El NDIS-TDI Hooking Engine, según lo utilizado en (1) KLICK (KLICK.SYS) y (2) KLIN (KLIN.SYS) en los controladores de dispositivos 2.0.0.281 en Kaspersky Labs Anti-Virus 6.0.0.303 y otros antivirus o productos de seguridad de Internet, permite a un usuario local ejecutar código de su elección a través de un estructura Irp artesanal con una dirección inválida en 0x80052110 IOCTL. • https://www.exploit-db.com/exploits/2676 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=425 http://secunia.com/advisories/22478 http://securitytracker.com/id?1017093 http://www.kaspersky.com/technews?id=203038678 http://www.osvdb.org/29891 http://www.securityfocus.com/archive/1/449289/100/0/threaded http://www.securityfocus.com/archive/1/449301/100/0/threaded http://www.securityfocus.com/bid/20635 http://www.vupen.com/english/advisories/2006/4117 https&# •

CVSS: 10.0EPSS: 13%CPEs: 5EXPL: 0

Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0018.html http://marc.info/?l=bugtraq&m=112837961522571&w=2 http://secunia.com/advisories/17024 http://securityreason.com/securityalert/44 http://securitytracker.com/id?1014998 http://www.kaspersky.com/news?id=171512144 http://www.osvdb.org/19850 http://www.rem0te.com/public/images/kaspersky.pdf http://www.securityfocus.com/bid/14998 http://www.vupen.com/english/advisories/2005/1934 https://exchange.xforce.ibmcloud& •