Page 6 of 38 results (0.004 seconds)

CVSS: 10.0EPSS: 13%CPEs: 5EXPL: 0

Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote attackers to execute arbitrary code via a CAB file with large records after the header. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0018.html http://marc.info/?l=bugtraq&m=112837961522571&w=2 http://secunia.com/advisories/17024 http://securityreason.com/securityalert/44 http://securitytracker.com/id?1014998 http://www.kaspersky.com/news?id=171512144 http://www.osvdb.org/19850 http://www.rem0te.com/public/images/kaspersky.pdf http://www.securityfocus.com/bid/14998 http://www.vupen.com/english/advisories/2005/1934 https://exchange.xforce.ibmcloud& •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 1

Kaspersky Anti-Virus for Unix/Linux File Servers 5.0-5 uses world-writable permissions for the (1) log and (2) license directory, which allows local users to delete log files, append to arbitrary files via a symlink attack on kavmonitor.log, or delete license keys and prevent keepup2date from properly executing. • ftp://ftp.aerasec.de/pub/advisories/kav4unix/kav4unix-local-root-exploit.txt http://marc.info/?l=bugtraq&m=112387573811339&w=2 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 1

The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs. • https://www.exploit-db.com/exploits/1032 http://marc.info/?l=bugtraq&m=111817777430401&w=2 http://www.securityfocus.com/bid/13878 •

CVSS: 7.5EPSS: 2%CPEs: 47EXPL: 2

Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. El módulo Perl Archive::Zip anterior a 1.14, cuando se usa en programas antivirus como amavisd-new, permite a atacantes remotos saltarse la protección del antivirus mediante un ficheros comprimido con cabeceras globales y locales establecido a cero, lo que no impide que el fichero comprimido sea abierto en un sistema objetivo. • https://www.exploit-db.com/exploits/629 http://secunia.com/advisories/13038 http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/492545 http://www.mandriva.com/security/advisories?name=MDKSA-2004:118 http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •

CVSS: 7.5EPSS: 95%CPEs: 48EXPL: 2

Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. • https://www.exploit-db.com/exploits/629 http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true http://www.securityfocus.com/bid/11448 https://exchange.xforce.ibmcloud.com/vulnerabilities/17761 •