CVE-2009-4215
https://notcve.org/view.php?id=CVE-2009-4215
Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs. Panda Global Protection 2010, Internet Security 2010, y Antivirus Pro 2010 usa permisos débiles (Todos: Control Total ) para los archivos product, lo que permite a usuarios locales obtener privilegios por reemplazamiento de ejecutables con programas troyanos. • http://secunia.com/advisories/37373 http://www.pandasecurity.com/homeusers/support/card?id=80164&idIdioma=2 http://www.securityfocus.com/archive/1/507811/100/0/threaded http://www.securitytracker.com/id?1023121 http://www.vupen.com/english/advisories/2009/3126 https://exchange.xforce.ibmcloud.com/vulnerabilities/54268 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-5536
https://notcve.org/view.php?id=CVE-2008-5536
Panda Antivirus 9.0.0.4, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. Panda Antivirus v9.0.0.4, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HTML colocando una cabecera MZ (alias "EXE info") al principio, y modificar el nombre del archivo a (1 ) sin extensión, (2) una extensión. txt, o (3) una extensión .jpg, como lo demuestra un documento que contiene un exploit CVE-2006-5745. • http://securityreason.com/securityalert/4723 http://www.securityfocus.com/archive/1/498995/100/0/threaded http://www.securityfocus.com/archive/1/499043/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 • CWE-20: Improper Input Validation •