Page 7 of 101 results (0.003 seconds)

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 0

27 Jan 2020 — A OS Command Injection vulnerability in the bootstrap stage of Bitdefender BOX 2 allows the manipulation of the `get_image_url()` function in special circumstances to inject a system command. Una vulnerabilidad de Inyección de Comandos de Sistema Operativo en la etapa de arranque de Bitdefender BOX 2, permite la manipulación de la función "get_image_url()" en circunstancias especiales para inyectar un comando de sistema. • https://www.bitdefender.com/support/security-advisories/bitdefender-box-2-bootstrap-get_image_size-command-injection-vulnerability • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

27 Jan 2020 — An Incorrect Default Permissions vulnerability in the BDLDaemon component of Bitdefender AV for Mac allows an attacker to elevate permissions to read protected directories. This issue affects: Bitdefender AV for Mac versions prior to 8.0.0. Una vulnerabilidad de Permisos Predeterminados Incorrectos en el componente BDLDaemon de Bitdefender AV para Mac, permite a un atacante elevar los permisos para leer directorios protegidos. Este problema afecta: Bitdefender AV para Mac versiones anteriores a 8.0.0. • https://www.bitdefender.com/support/security-advisories/get-task-allow-entitlement-via-bdldaemon-macos-va-3448 • CWE-276: Incorrect Default Permissions •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

27 Jan 2020 — An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. This issue affects: Bitdefender Bitdefender BOX 2 versions prior to 2.1.47.36. Se presenta una vulnerabilidad de ejecución de comando explotable en la partición de recuperación de Bitdefender BOX 2, ... • https://www.bitdefender.com/support/security-advisories/bitdefender-box-v2-bootstrap-update_setup-command-execution-vulnerability-va-2226 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition CWE-413: Improper Resource Locking •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

27 Jan 2020 — An Untrusted Search Path vulnerability in bdserviceshost.exe as used in Bitdefender Total Security 2020 allows an attacker to execute arbitrary code. This issue does not affect: Bitdefender Total Security versions prior to 24.0.12.69. Una vulnerabilidad de Ruta de Búsqueda No Confiable en el archivo bdserviceshost.exe como es usado en Bitdefender Total Security 2020, permite a un atacante ejecutar código arbitrario. Este problema no afecta: Bitdefender Total Security versiones anteriores a 24.0.12.69. • https://www.bitdefender.com/support/security-advisories/untrusted-search-path-vulnerability-bitdefender-total-security-2020-va-5895 • CWE-426: Untrusted Search Path •

CVSS: 10.0EPSS: 8%CPEs: 3EXPL: 1

06 Jan 2020 — A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability. Se ha detectado una vulnerabilidad de inyección de comandos en la etapa de arranq... • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0919 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

31 Oct 2019 — An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that allows an attacker to pass arbitrary code to the BOX appliance via the web API. In order to exploit this vulnerability, an attacker needs presence in Bitdefender BOX setup network and Bitdefender BOX be in setup mode. Se detectó un problema en Bitdefender BOX en las versiones de firmware anteriores a 2.1.37.37-34, lo que permite a un atacante pasar código arbitrario hacia el dispositivo BOX por medio de la API web. Para ex... • https://www.bitdefender.com/support/security-advisories/bitdefender-box-local-code-execution •

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

17 Oct 2019 — An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that affects the general reliability of the product. Specially crafted packets sent to the miniupnpd implementation in result in the device allocating memory without freeing it later. This behavior can cause the miniupnpd component to crash or to trigger a device reboot. Se detectó un problema en Bitdefender BOX versiones de firmware anteriores a 2.1.37.37-34 que afecta la confiabilidad general del producto. Los paquetes especi... • https://www.bitdefender.com/support/security-advisories/bitdefender-box-denial-service-va-3184 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

21 Aug 2019 — An Untrusted Search Path vulnerability in the ServiceInstance.dll library versions 1.0.15.119 and lower, as used in Bitdefender Antivirus Free 2020 versions prior to 1.0.15.138, allows an attacker to load an arbitrary DLL file from the search path. Una vulnerabilidad en An Untrusted Search Path en las versiones de la biblioteca ServiceInstance.dll 1.0.15.119 y anteriores, como se usa en las versiones de Bitdefender Antivirus Free 2020 anteriores a la versión1.0.15.138, permite a un atacante cargar un archiv... • https://safebreach.com/Post/BitDefender-Antivirus-Free-2020-Privilege-Escalation-to-SYSTEM • CWE-426: Untrusted Search Path •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

30 Jul 2019 — An issue was discovered in Bitdefender products for Windows (Bitdefender Endpoint Security Tool versions prior to 6.6.8.115; and Bitdefender Antivirus Plus, Bitdefender Internet Security, and Bitdefender Total Security versions prior to 23.0.24.120) that can lead to local code injection. A local attacker with administrator privileges can create a malicious DLL file in %SystemRoot%\System32\ that will be executed with local user privileges. Se detectó un problema en los productos de Bitdefender para Windows ... • https://www.bitdefender.com/support/security-advisories/code-injection-bitdefender-products-windows • CWE-427: Uncontrolled Search Path Element •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

24 May 2019 — An issue was discovered in Bitdefender Engines before 7.76662. A vulnerability has been discovered in the iso.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a division-by-zero circumstance. Paired with other vulnerabilities, this can result in denial-of-service. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. Fue encontrado un problema en Bitdefender Engines en versiones a... • https://www.bitdefender.com • CWE-369: Divide By Zero •