![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-44744
https://notcve.org/view.php?id=CVE-2024-44744
01 Oct 2024 — An issue in Malwarebytes Premium Security v5.0.0.883 allows attackers to execute arbitrary code via placing crafted binaries into unspecified directories. NOTE: Malwarebytes argues that this issue requires admin privileges and that the contents cannot be altered by non-admin users. • https://googleprojectzero.blogspot.com/2016/02/the-definitive-guide-on-win32-to-nt.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-6260 – Malwarebytes Antimalware Link Following Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-6260
05 Sep 2024 — Malwarebytes Antimalware Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Malwarebytes Antimalware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Malwarebytes service. By creating a symbolic link, an attacker can abuse the service to delete a file. • https://www.malwarebytes.com/secure/cves • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-25089
https://notcve.org/view.php?id=CVE-2024-25089
04 Feb 2024 — Malwarebytes Binisoft Windows Firewall Control before 6.9.9.2 allows remote attackers to execute arbitrary code via gRPC named pipes. Malwarebytes Binisoft Windows Firewall Control anterior a 6.9.9.2 permite a atacantes remotos ejecutar código arbitrario a través de canalizaciones con nombre gRPC. • https://hackerone.com/reports/2300061 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-29147
https://notcve.org/view.php?id=CVE-2023-29147
30 Jun 2023 — In Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files on different filesystems can have the same identifier. • https://malwarebytes.com • CWE-290: Authentication Bypass by Spoofing •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-29145
https://notcve.org/view.php?id=CVE-2023-29145
30 Jun 2023 — The Malwarebytes EDR 1.0.11 for Linux driver doesn't properly ensure whitelisting of executable libraries loaded by executable files, allowing arbitrary code execution. The attacker can set LD_LIBRARY_PATH, set LD_PRELOAD, or run an executable file in a debugger. • https://malwarebytes.com • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-27469
https://notcve.org/view.php?id=CVE-2023-27469
30 Jun 2023 — Malwarebytes Anti-Exploit 4.4.0.220 is vulnerable to arbitrary file deletion and denial of service via an ALPC message in which FullFileNamePath lacks a '\0' character. • https://malwarebytes.com • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-36631
https://notcve.org/view.php?id=CVE-2023-36631
26 Jun 2023 — Lack of access control in wfc.exe in Malwarebytes Binisoft Windows Firewall Control 6.9.2.0 allows local unprivileged users to bypass Windows Firewall restrictions via the user interface's rules tab. NOTE: the vendor's perspective is "this is intended behavior as the application can be locked using a password." • https://hackerone.com/reports/2000375 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-28892
https://notcve.org/view.php?id=CVE-2023-28892
29 Mar 2023 — Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\AdwCleaner\Logs\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link. • https://forums.malwarebytes.com/topic/307429-release-adwcleaner-841 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-26088
https://notcve.org/view.php?id=CVE-2023-26088
23 Mar 2023 — In Malwarebytes before 4.5.23, a symbolic link may be used delete any arbitrary file on the system by exploiting the local quarantine system. It can also lead to privilege escalation in certain scenarios. • https://support.malwarebytes.com/hc/en-us/articles/14279575968659-Malwarebytes-for-Windows-4-5-23-Release-Notes • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-25150
https://notcve.org/view.php?id=CVE-2022-25150
14 Feb 2022 — In Malwarebytes Binisoft Windows Firewall Control before 6.8.1.0, programs executed from the Tools tab can be used to escalate privileges. En Malwarebytes Binisoft Windows Firewall Control versiones anteriores a 6.8.1.0, los programas ejecutados desde la pestaña Herramientas pueden ser usados para escalar privilegios • https://binisoft.org/changelog.txt • CWE-269: Improper Privilege Management •