Page 4 of 80 results (0.010 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

KIS for macOS in some use cases was vulnerable to AV bypass that potentially allowed an attacker to disable anti-virus protection. KIS para macOS en algunos casos de uso era vulnerable a la omisión de AV que potencialmente permitía a un atacante deshabilitar la protección antivirus. • https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310321 • CWE-863: Incorrect Authorization •

CVSS: 5.5EPSS: 0%CPEs: 14EXPL: 0

A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower. Un usuario local (autenticado) con pocos privilegios puede explotar un comportamiento en un instalador de ESET para lograr la sobrescritura (eliminación) arbitraria de cualquier archivo por medio de un enlace simbólico, debido a permisos no seguros. • https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows • CWE-276: Incorrect Default Permissions •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

Beijing Huorong Internet Security 5.0.55.2 allows a non-admin user to escalate privileges by injecting code into a process, and then waiting for a Huorong services restart or a system reboot. Beijing Huorong Internet Security versión 5.0.55.2, permite a un usuario no administrador escalar privilegios inyectando código en un proceso y luego esperando que los servicios de Huorong se reinicien o un reinicio del sistema • https://github.com/yangfan6888/PoC https://github.com/yangfan6888/PoC/blob/main/PoC.cpp •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

ESET Archive Support Module before 1294 allows virus-detection bypass via crafted RAR Compression Information in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop. ESET Archive Support Module versiones anteriores a 1294, permite una omisión de detección de virus por medio de una Información de Compresión RAR en un archivo. Esto afecta a las versiones anteriores a 1294 de Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security para Android, Smart TV Security, y NOD32 Antivirus 4 para Linux Desktop. • https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html • CWE-436: Interpretation Conflict •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

The Quick Heal AV parsing engine (November 2019) allows virus-detection bypass via a crafted GPFLAG in a ZIP archive. This affects Total Security, Home Security, Total Security Multi-Device, Internet Security, Total Security for Mac, AntiVirus Pro, AntiVirus for Server, and Total Security for Android. El motor de análisis de Quick Heal AV (Noviembre 2019), permite una omisión de la detección de virus por medio de un GPFLAG diseñado en un archivo ZIP. Esto afecta a Total Security, Home Security, Total Security Multi-Device, Internet Security, Total Security for Mac, AntiVirus Pro, AntiVirus for Server, y Total Security for Android. • http://packetstormsecurity.com/files/156580/QuickHeal-Generic-Malformed-Archive-Bypass.html http://seclists.org/fulldisclosure/2020/Mar/14 https://blog.zoller.lu/p/from-low-hanging-fruit-department_24.html https://blog.zoller.lu/p/tzo-20-2020-quickheal-malformed-archive.html • CWE-436: Interpretation Conflict •