9 results (0.009 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

24 Mar 2025 — A vulnerability, which was classified as critical, has been found in Softwin WMX3 3.1. This issue affects the function ImageAdd of the file /ImageAdd.ashx. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_1.md • CWE-284: Improper Access Control CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.2EPSS: 6%CPEs: 9EXPL: 0

21 Mar 2012 — The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, and nProtect Anti-Virus 2011-01-17.01 allows remote attackers to bypass malware detection via an ELF file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additi... • http://www.ieee-security.org/TC/SP2012/program.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 9%CPEs: 9EXPL: 0

18 Dec 2006 — Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability." Desbordamiento de enteros en el fichero de la implementación del a... • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051319.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

10 Dec 2006 — BitDefender Mail Protection for SMB 2.0 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file. BitDefender Mail Protection para SMB 2.0 permite a atacantes remotos evitar una detección de virus, insertando caracteres inválidos en un contenido codificado base64 en un fichero MIME multipart/mixed, tal y como se demuestra con el fichero de testeo EICAR. • http://www.quantenblog.net/security/virus-scanner-bypass •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

14 Oct 2005 — Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. • http://marc.info/?l=bugtraq&m=112879611919750&w=2 •

CVSS: 8.4EPSS: 2%CPEs: 3EXPL: 0

05 Oct 2005 — Format string vulnerability in the logging functionality in BitDefender AntiVirus 7.2 through 9 allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in file or directory name. • http://kb.bitdefender.com/KB261-en--Filename-Format-String-Vulnerability.html • CWE-134: Use of Externally-Controlled Format String •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

19 Jul 2005 — BitDefender Engine 1.6.1 and earlier does not properly scan all attachments, which allows remote attackers to bypass virus scanning via begin and end commands in the body of the e-mail, which BitDefender treats as a uuencoded attachment and stops scanning afterwards. BitDefender Engine 1.6.1 y anteiores no escanea adecuadamente todos los adjuntos, lo que permite que atacantes remotos se salten el escaneo de virus mediante comandos de inicio y fin en el cuerpo del e-mail (lo que BitDefender trata como un adj... • http://marc.info/?l=bugtraq&m=112137542212322&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

26 Apr 2005 — Unquoted Windows search path vulnerability in BitDefender 8 allows local users to prevent BitDefender from starting by creating a malicious C:\program.exe, possibly due to the lack of quoting of the full pathname when executing a process. • http://marc.info/?l=bugtraq&m=111420400316397&w=2 •

CVSS: 9.8EPSS: 14%CPEs: 1EXPL: 4

19 Apr 2004 — The AVXSCANONLINE.AvxScanOnlineCtrl.1 ActiveX control in BitDefender Scan Online allows remote attackers to (1) obtain sensitive information such as system drives and contents or (2) use the RequestFile method to download and execute arbitrary code via an object codebase that uses bitdefender.cab. • https://www.exploit-db.com/exploits/24024 •