Page 2 of 8 results (0.002 seconds)

CVSS: 6.8EPSS: 0%CPEs: 9EXPL: 1

aavmker4.sys in avast! Home and Professional 4.7 for Windows does not properly validate input to IOCTL 0xb2d60030, which allows local users to gain privileges via certain IOCTL requests. aavmker4.sys en avast! Home y Professional 4.7 para Windows, no valida de forma correcta la entrada a IOCTL 0xb2d60030, esto permite a usuarios locales obtener privilegios a través de cierta solicitud IOCTL. Avast! version 4.7 aavmker4.sys local privilege escalation vulnerability. • https://www.exploit-db.com/exploits/12406 http://secunia.com/advisories/29605 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.securityfocus.com/archive/1/490321/100/0/threaded http://www.securityfocus.com/bid/28502 http://www.securitytracker.com/id?1019732 http://www.trapkit.de/advisories/TKADV2008-002.txt http://www.vupen.com/english/advisories/2008/1034/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41527 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 1%CPEs: 19EXPL: 1

Unspecified vulnerability in avast! 4 Home and Professional Editions before 4.7.1098 allows remote attackers to have an unknown impact via a crafted TAR archive. Vulnerabilidad no especificada en avast! 4, ediciones Home y Professional, en versiones anteriores a la 4.7.1098. Permite que atacantes remotos provoquen un impacto desconocido usando un archivo TAR manipulado. • http://secunia.com/advisories/27929 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.securityfocus.com/bid/26702 http://www.vupen.com/english/advisories/2007/4097 https://exchange.xforce.ibmcloud.com/vulnerabilities/38877 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 7%CPEs: 59EXPL: 1

unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. El archivo unzoo.c, tal como se utiliza en varios productos, incluyendo AMaViS versión 2.4.1 y anteriores, permite a los atacantes remotos causar una denegación de servicio (bucle infinito) por medio de un archivo ZOO con una estructura direntry que apunta hacia un archivo anterior. • http://osvdb.org/36208 http://secunia.com/advisories/25315 http://securityreason.com/securityalert/2680 http://www.amavis.org/security/asa-2007-2.txt http://www.securityfocus.com/archive/1/467646/100/0/threaded http://www.securityfocus.com/bid/23823 https://exchange.xforce.ibmcloud.com/vulnerabilities/34080 • CWE-399: Resource Management Errors •