CVE-2019-15688
https://notcve.org/view.php?id=CVE-2019-15688
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component did not adequately inform the user about the threat of redirecting to an untrusted site. Bypass. Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud hasta el 2020, el componente web protection no informó adecuadamente al usuario sobre la amenaza de redireccionar a un sitio no seguro . Omisión. • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2019-8286
https://notcve.org/view.php?id=CVE-2019-8286
Information Disclosure in Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security versions up to 2019 could potentially disclose unique Product ID by forcing victim to visit a specially crafted webpage (for example, via clicking phishing link). Vulnerability has CVSS v3.0 base score 2.6 La divulgación de información en Kaspersky Anti-Virus, Kaspersky Internet Security, las versiones de Kaspersky Total Security hasta 2019 podrían revelar una identificación de producto única al obligar a la víctima a visitar una página web especialmente diseñada (por ejemplo, haciendo clic en el enlace de phishing). La vulnerabilidad tiene CVSS v3.0 puntuación base 2.6 • http://www.securityfocus.com/bid/109300 https://support.kaspersky.com/general/vulnerability.aspx?el=12430#110719 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-1327
https://notcve.org/view.php?id=CVE-2011-1327
The Keystroke Encryption feature in Trend Micro Internet Security 2009 (aka Virus Buster 2009 and PC-cillin 2009) does not completely encrypt passwords, which allows local users to obtain sensitive information by leveraging a keylogger. La funcionalidad Keystroke Encryption en Trend Micro Internet Security 2009 (también conocido cómo Virus Buster 2009 y PC-cillin 2009) no cifra completamente las contraseñas, lo que permite a usuarios localtes obtener información sensible aprovechándose de un "keylogger" • http://esupport.trendmicro.co.jp/Pages/JP-2079186.aspx http://jvn.jp/en/jp/JVN99175647/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2011-000028 • CWE-310: Cryptographic Issues •
CVE-2009-1782
https://notcve.org/view.php?id=CVE-2009-1782
Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive. Múltiples productos antivirus F-Secure, incluidos: Anti-Virus for Microsoft Exchange v7.10 y anteriores; Internet Gatekeeper for Windows v6.61 y anteriores, Windows v6.61 y anteriores, y Linux v2.16 y anteriores; Internet Security 2009 y anteriores, Anti-Virus 2009 y anteriores, Client Security v8.0 y anteriores y otros; permiten a atacantes remotos saltar la detección de software malicioso mediante archivos (1) .ZIP y (2) .RAR manipulados. • http://secunia.com/advisories/35008 http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html http://www.securityfocus.com/bid/34849 http://www.securitytracker.com/id?1022170 http://www.securitytracker.com/id?1022171 http://www.securitytracker.com/id?1022172 http://www.vupen.com/english/advisories/2009/1262 https://exchange.xforce.ibmcloud.com/vulnerabilities/50346 •
CVE-2009-0686 – Trend Micro Internet Security Pro 2009 - Priviliege Escalation
https://notcve.org/view.php?id=CVE-2009-0686
The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory. Activity Monitor Module de TrendMicro (tmactmon.sys) versión 2.52.0.1002 en Internet Pro 2008 y 2009, y Security Pro 2008 y 2009 de Trend Micro, permite a los usuarios locales alcanzar privilegios por medio de un IRP diseñado en una petición IOCTL METHOD_NEITHER a \Device\tmactmon que sobrescribe la memoria. • https://www.exploit-db.com/exploits/8322 http://en.securitylab.ru/lab/PT-2009-09 http://milw0rm.com/sploits/2009-trendmicro_local_expl_0day.zip http://www.securityfocus.com/archive/1/502314/100/0/threaded http://www.securityfocus.com/bid/34304 http://www.securitytracker.com/id?1021955 https://exchange.xforce.ibmcloud.com/vulnerabilities/49513 • CWE-399: Resource Management Errors •