Page 9 of 49 results (0.017 seconds)

CVSS: 6.9EPSS: 0%CPEs: 29EXPL: 2

aavmKer4.sys in avast! Home and Professional for Windows before 4.8.1356 does not properly validate input to IOCTLs (1) 0xb2d6000c and (2) 0xb2d60034, which allows local users to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption, a different vulnerability than CVE-2008-1625. aavmKer4.sys en avast! Home y Professional para Windows anterior v4.8.1356 no proporciona entradas validad en IOCTLs (1) 0xb2d6000c y (2) 0xb2d60034, que permite a usuarios locales obtener privilegios a través de peticiones IOCTL usando direcciones de kernel manipuladas que lanzan una caída de memoria, una vulnerabilidad diferente que CVE-2008-1625. • https://www.exploit-db.com/exploits/12406 http://secunia.com/advisories/36858 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.ntinternals.org/ntiadv0904/ntiadv0904.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6024 • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 4%CPEs: 3EXPL: 0

Multiple stack-based buffer overflows in avast! Linux Home Edition 1.0.5, 1.0.5-1, and 1.0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via a malformed (1) ISO or (2) RPM file. Múltiple desbordamiento de búfer basado en pila en avast! Linux Home Edition v1.0.5, v1.0.5-1, y v1.0.8 que permite a los atacantes remotos causar una denegación de servicio (caída de la aplicación) o ejecutar arbitrariamente código a través de ficheros malformados (1) ISO o (2) RPM. • http://osvdb.org/52016 http://www.ivizsecurity.com/security-advisory-iviz-sr-08013.html http://www.securityfocus.com/archive/1/499080/100/0/threaded http://www.securityfocus.com/bid/32747 http://www.vupen.com/english/advisories/2008/3460 https://exchange.xforce.ibmcloud.com/vulnerabilities/47251 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

avast! antivirus 4.8.1281.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. avast! antivirus v4.8.1281.0, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HTML colocando una cabecera MZ (alias "EXE info") al principio, y modificar el nombre del archivo a (1 ) sin extensión, (2) una extensión. txt, o (3) una extensión .jpg, como lo demuestra un documento que contiene un exploit CVE-2006-5745. • http://securityreason.com/securityalert/4723 http://www.securityfocus.com/archive/1/498995/100/0/threaded http://www.securityfocus.com/archive/1/499043/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 0%CPEs: 9EXPL: 1

aavmker4.sys in avast! Home and Professional 4.7 for Windows does not properly validate input to IOCTL 0xb2d60030, which allows local users to gain privileges via certain IOCTL requests. aavmker4.sys en avast! Home y Professional 4.7 para Windows, no valida de forma correcta la entrada a IOCTL 0xb2d60030, esto permite a usuarios locales obtener privilegios a través de cierta solicitud IOCTL. Avast! version 4.7 aavmker4.sys local privilege escalation vulnerability. • https://www.exploit-db.com/exploits/12406 http://secunia.com/advisories/29605 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.securityfocus.com/archive/1/490321/100/0/threaded http://www.securityfocus.com/bid/28502 http://www.securitytracker.com/id?1019732 http://www.trapkit.de/advisories/TKADV2008-002.txt http://www.vupen.com/english/advisories/2008/1034/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41527 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 1%CPEs: 19EXPL: 1

Unspecified vulnerability in avast! 4 Home and Professional Editions before 4.7.1098 allows remote attackers to have an unknown impact via a crafted TAR archive. Vulnerabilidad no especificada en avast! 4, ediciones Home y Professional, en versiones anteriores a la 4.7.1098. Permite que atacantes remotos provoquen un impacto desconocido usando un archivo TAR manipulado. • http://secunia.com/advisories/27929 http://www.avast.com/eng/avast-4-home_pro-revision-history.html http://www.securityfocus.com/bid/26702 http://www.vupen.com/english/advisories/2007/4097 https://exchange.xforce.ibmcloud.com/vulnerabilities/38877 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •