Page 2 of 9 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Panda Platinum Internet Security 2006 10.02.01 and 2007 11.00.00 uses sequential message numbers in generated URLs that are not filtered if the user replies to a message, which might allow remote attackers to determine mail usage patterns. Panda Platinum Internet Security 2006 10.02.01 y 2007 11.00.00 utiliza los números de mensaje secuenciales en URLs generadas que no se filtran si el usuario contestó a un mensaje, lo cual permite a atacante remotos determinen patrones de uso del correo. • http://secunia.com/advisories/21769 http://securityreason.com/securityalert/1524 http://www.security.nnov.ru/advisories/pandais.asp http://www.securityfocus.com/archive/1/445479/100/0/threaded http://www.securityfocus.com/bid/19891 •

CVSS: 7.5EPSS: 19%CPEs: 20EXPL: 0

Heap-based buffer overflow in pskcmp.dll in Panda Software Antivirus library allows remote attackers to execute arbitrary code via a crafted ZOO archive. • http://secunia.com/advisories/17765 http://securityreason.com/securityalert/216 http://securitytracker.com/id?1015295 http://www.osvdb.org/21256 http://www.rem0te.com/public/images/panda.pdf http://www.securityfocus.com/archive/1/418096/100/0/threaded http://www.securityfocus.com/bid/15616 http://www.vupen.com/english/advisories/2005/2666 https://exchange.xforce.ibmcloud.com/vulnerabilities/23276 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Panda Security 3.0 allows users to uninstall the Panda software via its Add/Remove Programs applet. • http://updates.pandasoftware.com/docs/us/Avoidvulnerability.zip http://www.securityfocus.com/bid/1119 http://www.securityfocus.com/templates/archive.pike?list=1&msg=38FB45F2.550EA000%40teleline.es •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

Panda Security 3.0 with registry editing disabled allows users to edit the registry and gain privileges by directly executing a .reg file or using other methods. • https://www.exploit-db.com/exploits/19855 http://updates.pandasoftware.com/docs/us/Avoidvulnerability.zip http://www.securityfocus.com/bid/1119 http://www.securityfocus.com/templates/archive.pike?list=1&msg=38FB45F2.550EA000%40teleline.es •