Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gdata-software total security vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-9742
gdwfpcd.sys in G Data Total Security prior to 2019-02-22 allows an malicious user to bypass ACLs because Interpreted Device Characteristics lacks FILE_DEVICE_SECURE_OPEN and therefore files and directories "inside" the \\.\gdwfpcd device are not properly protected, lead...
Gdata-software Total Security
6.8
CVSSv2
CVE-2018-10018
The GDASPAMLib.AntiSpam ActiveX control ASK\GDASpam.dll in G DATA Total Security 25.4.0.3 has a buffer overflow via a long IsBlackListed argument.
Gdata-software Total Security 25.4.0.3
1 EDB exploit
4.3
CVSSv2
CVE-2012-1457
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSa...
Bitdefender Bitdefender 7.2
Cat Quick Heal 11.00
Ikarus Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0
Jiangmin Jiangmin Antivirus 13.0.900
Pc Tools Pc Tools Antivirus 7.0.3.5
Rising-global Rising Antivirus 22.83.00.03
Avira Antivir 7.11.1.163
Clamav Clamav 0.96.4
Authentium Command Antivirus 5.2.11.5
K7computing Antivirus 9.77.3565
Kaspersky Kaspersky Anti-virus 7.0.0.125
Symantec Endpoint Protection 11.0
Trendmicro Trend Micro Antivirus 9.120.0.1004
Alwil Avast Antivirus 5.0.677.0
Avg Avg Anti-virus 10.0.0.1190
F-prot F-prot Antivirus 4.6.2.117
Gdata-software G Data Antivirus 21
Microsoft Security Essentials 2.0
Eset Nod32 Antivirus 5795
Norman Norman Antivirus \\& Antispyware 6.06.12
Virusbuster Virusbuster 13.6.151.0
Antiy Avl Sdk 2.0.3.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started