
CVE-2019-15688
https://notcve.org/view.php?id=CVE-2019-15688
26 Nov 2019 — Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component did not adequately inform the user about the threat of redirecting to an untrusted site. Bypass. Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud hasta el 2020, el componente web protection no inf... • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2019-18654
https://notcve.org/view.php?id=CVE-2019-18654
01 Nov 2019 — A Cross Site Scripting (XSS) issue exists in AVG AntiVirus (Internet Security Edition) 19.3.3084 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name. Se presenta un problema de tipo Cross Site Scripting (XSS) en AVG AntiVirus (Internet Security Edition) versión 19.3.3084 build 19.3.4241.440, en la ventana emergente de notificación de red, permitiendo a un atacante ejecutar código JavaScript por medio de un nombre SSID. • http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-18644
https://notcve.org/view.php?id=CVE-2019-18644
30 Oct 2019 — The malware scan function in Total Defense Anti-virus 11.5.2.28 is vulnerable to a TOCTOU bug; consequently, symbolic link attacks allow privileged files to be deleted. La función malware scan en Total Defense Anti-virus versión 11.5.2.28, es vulnerable a un error TOCTOU; en consecuencia, los ataques de enlaces simbólicos permiten que archivos privilegiados sean eliminados. • https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/Total%20Defense/Privileged%20File%20Delete/v11.5.2.28/README.md • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2019-18645
https://notcve.org/view.php?id=CVE-2019-18645
30 Oct 2019 — The quarantine restoration function in Total Defense Anti-virus 11.5.2.28 is vulnerable to symbolic link attacks, allowing files to be written to privileged directories. La función quarantine restoration en Total Defense Anti-virus versión 11.5.2.28, es vulnerable a ataques de enlaces simbólicos, permitiendo que los archivos se escriban en directorios privilegiados. • https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/Total%20Defense/Local%20Privilege%20Escalation/v11.5.2.28/README.md • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2019-17093
https://notcve.org/view.php?id=CVE-2019-17093
23 Oct 2019 — An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0. Se detectó un problema en Avast antivirus versiones anteriores a 19.8 y AVG antivirus versiones anteriores a 19.8. Una ... • https://safebreach.com/Post/Avast-Antivirus-AVG-Antivirus-DLL-Preloading-into-PPL-and-Potential-Abuses • CWE-427: Uncontrolled Search Path Element •

CVE-2019-13355
https://notcve.org/view.php?id=CVE-2019-13355
24 Sep 2019 — In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ used by ccschedulersvc.exe allows local attackers to hijack dotnetproxy.exe, which leads to privilege escalation when the ccSchedulerSVC service runs the executable. En Total Defense Anti-virus versión 9.0.0.773, el control de acceso no seguro para el directorio %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ usado por el archivo ccschedulersvc.exe, permite a atacantes locales secuestrar el... • https://github.com/NtRaiseHardError/Antimalware-Research/tree/master/Total%20Defense/Local%20Privilege%20Escalation/v9.0.0.773 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2019-13356
https://notcve.org/view.php?id=CVE-2019-13356
24 Sep 2019 — In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\bd\TDUpdate2\ used by AMRT.exe allows local attackers to hijack bdcore.dll, which leads to privilege escalation when the AMRT service loads the DLL. En Total Defense Anti-virus versión 9.0.0.773, el control de acceso no seguro para el directorio %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\bd\TDUpdate2\ utilizado por el archivo AMRT.exe, permite a atacantes locales secuestrar la biblioteca... • https://github.com/NtRaiseHardError/Antimalware-Research/tree/master/Total%20Defense/Local%20Privilege%20Escalation/v9.0.0.773 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2019-13357
https://notcve.org/view.php?id=CVE-2019-13357
24 Sep 2019 — In Total Defense Anti-virus 9.0.0.773, resource acquisition from the untrusted search path C:\ used by caschelp.exe allows local attackers to hijack ccGUIFrm.dll, which leads to code execution. SYSTEM-level code execution can be achieved when the ccSchedulerSVC service runs the affected executable. En Total Defense Anti-virus versión 9.0.0.773, la adquisición de recursos desde la ruta de búsqueda no confiable C:\ usada por el archivo caschelp.exe, permite a atacantes locales secuestrar la biblioteca ccGUIFr... • https://github.com/NtRaiseHardError/Antimalware-Research/tree/master/Total%20Defense/DLL%20Hijacking/v9.0.0.773 • CWE-426: Untrusted Search Path •

CVE-2019-8286
https://notcve.org/view.php?id=CVE-2019-8286
18 Jul 2019 — Information Disclosure in Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security versions up to 2019 could potentially disclose unique Product ID by forcing victim to visit a specially crafted webpage (for example, via clicking phishing link). Vulnerability has CVSS v3.0 base score 2.6 La divulgación de información en Kaspersky Anti-Virus, Kaspersky Internet Security, las versiones de Kaspersky Total Security hasta 2019 podrían revelar una identificación de producto única al obligar a l... • http://www.securityfocus.com/bid/109300 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2018-6201
https://notcve.org/view.php?id=CVE-2018-6201
25 Jan 2018 — In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020E0 or 0x830020E4. En eScan Antivirus 14.0.1400.2029, el archivo del controlador (econceal.sys) permite que usuarios locales provoquen una denegación de servicio (BSOD) o que, posiblemente, tengan otro impacto sin especificar debido a que no valida los valores de entrada desde IOCtl 0x830020... • https://github.com/ZhiyuanWang-Chengdu-Qihoo360/EscanAV_POC/tree/master/0x830020E0_0x830020E4 • CWE-20: Improper Input Validation •